The ubiquitous presence of the Internet and the growing
|
|
- Jessie Hines
- 8 years ago
- Views:
Transcription
1 A CYBER FOREIGN POLICY TIME FOR CANADA TO GET ONE Paul Meyer Cyber security is a growing concern as global dependence on the Internet increases. The development of an international regime to govern the use of cyberspace is at an early stage. Canada currently lacks an articulated foreign policy for cyberspace, although it has tried to incorporate the new cyber reality into traditional foreign policy goals. The time has come for Canada to develop a dedicated cyber foreign policy with an associated diplomatic strategy to promote it, and a supporting policy and research capacity. La cybersécurité soulève une inquiétude grandissante à mesure que s accroît la dépendance mondiale à l égard d Internet. Pourtant, on commence à peine à élaborer un système international qui régirait l utilisation du cyberespace. Le Canada ne possède en la matière aucune politique étrangère spécifique, même s il a tenté d intégrer cette nouvelle réalité virtuelle à ses objectifs traditionnels. Il doit donc établir sans délai une politique étrangère du cyberespace, accompagnée des stratégies diplomatiques nécessaires à sa promotion et soutenue à la fois par des capacités de recherche et des mesures concrètes. The ubiquitous presence of the Internet and the growing dependency on it for a wide spectrum of human activity has naturally given rise to concerns about the security of cyberspace. According to current estimates, 26 percent of the world s population, or 1.7 billion people, use the Internet. At all levels, from states to private citizens, reliance on the Internet is growing and interests from national security to individual financial ones are engaged and potentially at risk from cyber attack. Concerns over cyber security have led several states to formulate national cyber security strategies to address threats to cyberspace. The United States unveiled its strategy in May 2009, the UK in June 2009 and Australia released its national strategy in October In the Speech from the Throne in March 2010 the Canadian government indicated its intention to set out a national blueprint for cyber security and released its own strategy in early October. Understandably, much of the focus of these national strategies is on developing the domestic capacities to counter cyber crime and other threats to cyber security. At the same time, the Internet is quintessentially a global instrument, and securing cyberspace will necessarily require international cooperation. The realm of international relations is normally governed by the foreign policy of states. Cyber experts in Canada have decried the apparent lack of a foreign policy for cyberspace. In the words of one leading observer, University of Toronto s Ron Diebert: At present, Canada has no foreign and security policy for cyberspace. There is no Canadian Cyber Command, such as that which was recently stood up in the United States, nor does Canada have an Office of Cyberspace in Foreign Affairs. We are not only miserably behind other countries in this respect; we have not even begun to form a strategic policy. Of course, policy is more than just the institutional trappings of military commands or divisions within a foreign ministry. It is developing a set of objectives linked to some primary values and interests of a state that governs its interaction in the international arena. While one might search in vain for a volume on a foreign affairs department shelf (or a document on its Web site) entitled A Cyber Foreign Policy for Canada, it would be wrong to assume that the emerging phenomenon of cyber security is not being taken into account in the conduct of Canada s foreign policy. That policy reflects enduring Canadian values and interests, such as advocating respect for human rights, promoting the rule of law and fostering democracy. Contributing to national and global peace and security, economic prosperity and individual and social well-being are key goals of Canada s international relations. The cyber 70
2 realm, like other major technological innovations before it, will over time be integrated into the foreign policy of states and the international system as a whole. This article describes some of the varied activities and forums related to cyberspace, and cyber security in particular, in which Canada is currently engaged. It will also consider some of the challenges facing Canada in defining its cyber foreign policy and possible areas of focus for the nation in this vast and rapidly changing field. One of the principal reasons why foreign policy approaches to cyberspace are only now emerging, is that this realm has developed largely outside the sphere of state-to-state relations that foreign policy normally addresses. The Internet has been a creation of civil society, and many consider its governance should best be left to nongovernmental entities. Informal associations, such as the Internet Corporation for Assigned Names and Numbers (ICANN), have provided the basis for administering the domain name systems that are at the heart of the Internet. Many users of the Internet believe that this global tool for the free flow of information and human interaction must be protected from those forces that would seek to control or manipulate it for political or commercial purposes. At the same time, the growing importance of the Internet and its potential to connect directly with individuals, without going through official channels, has prompted increased attention on the part of governments around the world. There is a predisposition on the part of many states to want to develop some form of regulation of cyberspace, akin to the regulations that have governed earlier forms of telecommunication and broadcasting. As an emerging global public policy challenge, the use of cyberspace is being subjected to scrutiny by the international community, Canada included, and the first outline of a multilateral governance system is beginning to take shape. At the level of international relations and the United Nations, initial policy development regarding cyberspace occurred in the framework of the World While one might search in vain for a volume on a foreign affairs department shelf (or a document on its Web site) entitled A Cyber Foreign Policy for Canada, it would be wrong to assume that the emerging phenomenon of cyber security is not being taken into account in the conduct of Canada s foreign policy. A cyber foreign policy time for Canada to get one Summit on the Information Society (WSIS), which was held in two stages and in two locales: in Geneva in December 2003 and in Tunis in November The Geneva stage produced a declaration setting out key principles of the Information Society and an associated Action Plan to guide follow-on work in support of these principles. The Tunis session mirrored this output with its Commitment and Agenda documents. Together these consensus outcome documents represent the core of global policy direction on cyberspace and its usage. This policy guidance, however, is not of a nature to be summarized in a concise one-page communiqué. The first Geneva stage of WSIS adopted a declaration of principles that set out in no less than 67 paragraphs a collective vision for the Information Society. It is worth citing its opening paragraph in full to convey a sense of the direction it provided: 1. We, the representatives of the peoples of the world, assembled in Geneva from December 2003 for the first phase of the World Summit on the Information Society, declare our common desire and commitment to build a people-centred, inclusive and development-oriented Information Society, where everyone can create, access, utilize and share information and knowledge, enabling individuals, communities and peoples to achieve their full potential in promoting their sustainable development and improving their quality of life, premised on the purposes and principles of the Charter of the United Nations and respecting fully and upholding the Universal Declaration of Human Rights. These lofty principles are expanded upon in the rest of the declaration and in the accompanying action plan, but the chief themes are evident in the opening paragraph: peoplecentred, development-oriented, aligned with the UN Charter and supportive of human rights. Cyber security figures among the various facets of the declaration, although it is approached at a high level of generality: We support the activities of the United Nations to prevent the potential use of ICT (Information and Communications Technologies) for purposes that are inconsistent with the objectives of maintaining international stability and security, and may adversely affect the integrity of the infrastructure within States, to the detriment of their security. The tricky question of who governs the Internet is addressed in an inclusive manner in the declaration: The management of the Internet encompasses both technical and public policy issues and should involve all stakeholders and relevant intergovernmental and international organizations. A role for states, the private sector, civil society and inter-governmental and international organizations is affirmed without being overly prescriptive of who actually does what. To a degree, the entire question of governance was punted with the decision to create the Internet Governance Forum. This multi-stakeholder forum was deliberately established as a non-decision-making grouping that would provide a nexus for discussion of issues relevant to POLICY OPTIONS DECEMBER 2010-JANUARY
3 Paul Meyer cyberspace, but with no authority to determine policy. It has met annually since the 2005 session of WSIS. As its initial five-year mandate is coming to a close, the UN secretary general is directed to develop recommendations regarding the forum s future for consideration by UN member states. The WSIS process has also engendered a parallel mechanism for coordinating work by the UN system in implementing the Geneva Action Plan and Tunis Agenda. The United Nations Group on the Information Society (UNGIS) comprises 30 specialized agencies and programs of the UN and has met on an annual basis since its inception in Among these UN agencies, the International Telecommunications Union (ITU) has been assuming a leadership role on issues relating to WSIS follow-up. It has, in collaboration with UNESCO and the UN Development Program, been responsible for organizing annual sessions of the WSIS Forum, a further multi-stakeholder gathering, established to review progress on WSIS implementation. While this description of current international activity on cyber issues has concentrated on the global level represented by the UN, there is also an extensive range of activity undertaken by regional organizations and crossregional bodies. The Organization for Security and Co-operation in Europe, Organization of American States, Asia- Pacific Economic Cooperation, Organisation for Economic Co-operation and Development, NATO and the Council of Europe are just some of the more salient regional organizations engaged in cyber security work relevant to their mandates and members interests. One of the most important products of a regional organization has been the Convention on Cyber Crime, which was developed by the Council of Europe and opened for signature in Budapest in This convention, which entered into force in 2004, has been signed by 46 states and ratified by 30 states. It represents one of the first efforts to develop a legally binding international agreement requiring states to combat cyber crime within their jurisdiction and to cooperate with official agencies of other signatory governments to facilitate prosecution of cyber crime. The G8 s Roma/Lyon Group, focused on counter-terrorism and counter-organized crime activity, has also been an active grouping of states collaborating behind the scenes to combat cyber attacks by terrorists or criminal entities. Whether at the global or regional levels, activity on cyber security has tended to fall into four broad areas: i) education and awareness-raising; ii) ensuring integrity of cyber systems; iii) technical assistance and capacity-building and iv) development of norms and standards. Given the complexity and relative newness of cyber security, a great deal of basic work is required to raise awareness within international organizations and their member states as to the nature of cyber threats and the potential negative impact on their interests. After education as to the seriousness of the threat, there is a natural focus on securing the integrity of the informational systems utilized by the organization and member states against these threats. In light of the disparities in cyber security capacities among states, it is also logical to stress the provision of technical assistance and capacity-building to ensure that the less developed member states achieve a modicum of cyber security capability. Finally, there is frequently an interest in developing norms or standards to govern cyber security The Internet has been a creation of civil society, and many consider its governance should best be left to nongovernmental entities. Informal associations, such as the Internet Corporation for Assigned Names and Numbers (ICANN), have provided the basis for administering the domain name systems that are at the heart of the Internet. behaviour. This realm of action, particularly when it tries to move beyond political measures to specify international legal obligations, is extremely challenging. Currently the Budapest Convention on Cybercrime is one of the few international legal instruments extant in the field of cyber security and it has been criticized from several perspectives. In particular, its origins as a Council of Europe agreement and the council s control of amendments are cited as reasons why the Budapest Convention may not prove acceptable as the global treaty on cyber crime that its proponents had hoped it to be. Where is Canada in this vast arena of cyber activity? Canada and its official delegations to the international forums mentioned above have been active in the debates and in shaping the outcomes to date. This involvement has been informed by the main tenets of Canadian foreign policy as our diplomats and representatives have tried to integrate the implications of cyber security into the international system. This process may resemble grafting more than new plantings in the sense that the cyber dimension is added to existing structures or processes aimed at achieving basic goals of Canadian foreign policy. For example, at the Human Rights Council and its forerunner, the Commission on Human Rights, Canada has taken the lead in preparing a resolution affirming the importance of freedom of opinion and expression. Previously, this resolution focused on the role of the printed and electronic media in realising this fundamental freedom. The current version, adopted in October 2009, explicitly recognized, alongside the 72
4 traditional media, the importance of the Internet in the exercise, promotion and protection of the right to freedom of opinion and expression. In this way, the Internet was granted a status similar to the older media forms in the implementation of one of the primary freedoms enshrined in international human rights law. Critics will point out that this is only part of a declaratory policy resolution with no binding power. The fact that the UN s premier human rights body, in a consensus resolution, has acknowledged the role of the Internet in fostering freedom of opinion and expression has political and practical significance. The resolution provides a key authoritative reference that can be cited if state action subsequently fails to uphold these standards. The creation of norms and standards regarding the use of cyberspace, and cyber security in particular, is one of the chief avenues for Canadian foreign policy action in this realm. Some norm-setting comes through the patient craft of multilateral diplomacy and the fashioning of declaratory policy statements such as the WSIS outcome documents or UN resolutions. A more demanding expression of norm-making is the negotiation of international legal instruments that are binding on those states that sign on to them. There are relatively few such agreements governing cyberspace. This reflects the newness and complexity of the subject and the degree of obligation represented by these instruments. The Budapest Convention on Cyber Crime is a rare example of a binding instrument, but the problems it has encountered in gaining global acceptance do not augur well for future treaties on cyber security. The requirements for developing implementing legislation and regulation are also an obstacle for treaty ratification even for states with the political intent to achieve the treaty s aims. Canada, for example, has still not ratified the A cyber foreign policy time for Canada to get one Budapest Convention even though it was among its initial signatories in November The protracted process for negotiation, signature and ratification of treaties has led some observers to conclude that treaty-making is not the most promising approach to address as complex and rapidly changing an environment as cyberspace. An alternative to treaty-making in the cyber realm is the development of so-called politically binding measures. These can take various forms, such as confidence-building measures, codes of conduct or rules of the road. In the international security field, such measures have been Extrapolating from its long association with international development efforts, Canada is well positioned to aid less developed countries in bridging what has been termed the digital divide. Much activity has already been supported by Canada in this field as key development goals such as public health, poverty eradication, education and gender equality are promoted through cyber-related projects. popular as a substitute or supplement to the more demanding treaty form. At times such measures have served as precursors for legally binding instruments to follow. For example, the confidence-building measures in the Helsinki Final Act and the Stockholm Agreement preceded the mandatory measures for notification and observation negotiated in the Conventional Forces in Europe (CFE) treaty. For those concerned with preventing cyber warfare and developing norms of state behaviour in the conduct of cyber operations, the option of developing a set of political measures may prove a more practical avenue to explore than initiating formal treaty negotiations. Canada has been associated in the past with the promotion of such confidence-building measures in the international security field (e.g., in outer space security) and could contribute to the formulation of new measures to prevent or moderate conflict in the cyber realm. Given the wide disparities in cyber capabilities globally, it is not surprising that technical assistance and capacitybuilding are prominent themes in international cyber discussions. Extrapolating from its long association with international development efforts, Canada is well positioned to aid less developed countries in bridging what has been termed the digital divide. Much activity has already been supported by Canada in this field as key development goals such as public health, poverty eradication, education and gender equality are promoted through cyber-related projects. Canada can also contribute in the crucial, if at times sensitive, realms of democratic development, promotion of human rights and upholding the rule of law as these pertain to cyberfocused activity. The Open Net Initiative, which monitors steps taken by some governments to censor and control cyberspace, is but one example of the vital work that is underway and that will require sustained support in the future. While this brief account of Canadian action internationally shows that cyber-related interests are already being woven into the fabric of Canada s foreign policy, what should the priorities be in future? There would seem to be at least three areas that require priority attention if a Canadian cyber foreign policy is to be developed. The first is to seek to fashion an integrated cyber foreign policy, rather than a disconnected series of foreign policy actions with cyber elements to them. In other words, to set out a cyber foreign policy rather than simply a POLICY OPTIONS DECEMBER 2010-JANUARY
5 Paul Meyer foreign policy that happens to contain some cyber aspects. This is more than a semantic difference, but rather a qualitatively different approach that strives to identify cyber-relevant aims Canada wishes to pursue and integrate these into a coherent foreign policy. Only in this way can a view of the whole be achieved and the latent synergies of cyber activity in a myriad of international forums be realised. The second priority is to harness this foreign policy to a strategy for its implementation in the international arena. It is not sufficient to have clear and laudatory goals for one s cyber foreign policy; there needs to be a diplomatic strategy for their achievement. This will require careful analysis of the comparative advantages of various forums for advancing Canadian cyber objectives and how best to build the likeminded coalitions to gain support for these aims. It will also entail some prioritization of Canadian objectives as it will not be possible to give them all the same level of attention and resources. The third priority is investing in the policy and research capacity to support the development of the cyber foreign policy and strategy described above. At present, no new resources have been provided to DFAIT for carrying out an enhanced policy effort on cyberspace. What activity has been undertaken has been ad hoc and incremental to existing tasks of officers working on files such as counter-terrorism, anti-crime and legal affairs. While certain other departments and agencies of the Canadian government have had some international engagement on dimensions of cyberspace (e.g., Industry Canada on promotion of the digital economy), none have the mandate or capacity to develop a foreign policy for cyberspace. Such an effort will demand a substantial commitment of policy capacity and diplomatic resources to ensure that a cyber foreign policy of real international impact is created and successfully carried out. This in turn will require the support of a government that wants to see Canada help influence the emerging global public policy regime for cyber space, rather than simply accept one designed by others. Paul Meyer is a former Canadian foreign service officer with 35 years of diplomatic experience. He served as Canada s ambassador and permanent representative to the United Nations in Geneva and as director-general of the Security and Intelligence Bureau at Foreign Affairs and International Trade. In both of these assignments he was engaged in cyber security policy matters. CANADA S PREMIER PUBLIC POLICY MARKETPLACE The best way to reach the public policy community Career opportunities Academic courses Events and conferences Événements et conférences Offres d emploi Éducation et formation LE PORTAIL POUR REJOINDRE LA COMMUNAUTÉ DES AFFAIRES PUBLIQUES For information and rate card: sostiguy@irpp.org Renseignements et tarifs : sostiguy@irpp.org 74
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
More informationUnited Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes
United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes Zero Draft Preamble 1. Recalling the request in paragraph 111 of the Tunis Agenda for the Information Society to
More informationTUNIS COMMITMENT. Document WSIS-05/TUNIS/DOC/7 -E 18 November 2005 Original: English
Document WSIS-05/TUNIS/DOC/7 -E 18 November 2005 Original: English TUNIS COMMITMENT 1. We, the representatives of the peoples of the world, have gathered in Tunis from 16-18 November 2005 for this second
More informationMichael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More informationDraft WGIG Issues Paper on E-Commerce
Draft WGIG Issues Paper on E-Commerce This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members, but it does not
More informationOutcome Document The New Delhi Declaration on Inclusive ICTs for Persons with Disabilities: Making Empowerment a Reality
United Nations Educational, Scientific and Cultural Organization Organisation des Nations Unies pour l éducation, la science et la culture Outcome Document The New Delhi Declaration on Inclusive ICTs for
More informationUNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by INTEL DISCLAIMER: The views presented
More informationGeneral Assembly. United Nations A/69/723
United Nations A/69/723 General Assembly Distr.: General 13 January 2015 Original: English Sixty-ninth session Agenda item 91 Developments in the field of information and telecommunications in the context
More informationITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
More informationCommittee of Ministers - The promotion of Internet and online media services a...
Page 1 of 5 Ministers Deputies CM Documents CM/AS(2010)Rec1882 final 18 June 2010 The promotion of Internet and online media services appropriate for minors Parliamentary Assembly Recommendation 1882 (2009)
More informationPanel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents
Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Catherine Lotrionte and Eneken Tikk, co-chairs Cyber security and the acceptable behavior of state and non-state
More informationOutcome Document of the High Level Meeting of the General Assembly on the Overall Review of the Implementation of WSIS Outcomes
Outcome Document of the High Level Meeting of the General Assembly on the Overall Review of the Implementation of WSIS Outcomes Preamble 1. Recalling the request in paragraph 111 of the Tunis Agenda for
More informationGermany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
More informationpeace, Security and Development in BRICS
BRICS ACADEMIC FORUM 2014: THE ELEPHANT IN THE ROOM: PEACE AND SECURITY IN THE BRICS PARTNERSHIP TOWARDS THE 6 TH BRICS SUMMIT Dr Candice Moore Senior Researcher (ACCORD) and Research Associate (UJ, Faculty
More informationDECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.
More information2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
More informationPresentation to 21 st Asian Export Control Seminar The Wassenaar Arrangement and the ATT 26-28 February 2014. Tokyo, Japan
Check Against Delivery Presentation to 21 st Asian Export Control Seminar The Wassenaar Arrangement and the ATT 26-28 February 2014 Tokyo, Japan It is a pleasure to join the Asian Export Control Seminar
More informationTwelfth United Nations Congress on Crime Prevention and Criminal Justice
United Nations A/65/92 General Assembly Distr.: General 10 June 2010 Original: English Sixty-fifth session Item 107 of the preliminary list * Crime prevention and criminal justice Twelfth United Nations
More informationThe global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
More informationNational Cyber Security Strategy 2015-2017
National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.
More informationDECLARATION ON STRENGTHENING GOOD GOVERNANCE AND COMBATING CORRUPTION, MONEY-LAUNDERING AND THE FINANCING OF TERRORISM
MC.DOC/2/12 Organization for Security and Co-operation in Europe Ministerial Council Dublin 2012 Original: ENGLISH Second day of the Nineteenth Meeting MC(19) Journal No. 2, Agenda item 7 DECLARATION ON
More informationUnited Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes
United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes Draft Outcome Document 4 November 2015 Preamble 1. Recalling the request in paragraph 111 of the Tunis Agenda for
More informationSecurity concerns and the desire to reduce fossil fuel emissions have led the United Nations to take up the topic of nuclear power.
Topic 1: Nuclear Power Security concerns and the desire to reduce fossil fuel emissions have led the United Nations to take up the topic of nuclear power. The United Nations is concerned with the spread
More informationHow To Write A Letter To The World'S Leaders On The Ovemll Review
THE PRESIDENT OF THE GENERAL AS SEMBLY 12 August 2015 Excellency, I have the pleasure to transmit herewith a SmrunillY of the key messages and proposals fi'om the Informal Intemctive Stakeholders Consultation
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationE Distr. LIMITED E/ESCWA/2015/EC.2/4(Part IV) 17 November 2015 ORIGINAL: ENGLISH
UNITED NATIONS ECONOMIC AND SOCIAL COUNCIL E Distr. LIMITED E/ESCWA/2015/EC.2/4(Part IV) 17 November 2015 ORIGINAL: ENGLISH Economic and Social Commission for Western Asia (ESCWA) Executive Committee Second
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund
More informationATLANTA DECLARATION AND PLAN OF ACTION FOR THE ADVANCEMENT OF THE RIGHT OF ACCESS TO INFORMATION
ATLANTA DECLARATION AND PLAN OF ACTION FOR THE ADVANCEMENT OF THE RIGHT OF ACCESS TO INFORMATION We, over 125 members of the global access to information community from 40 countries, representing governments,
More informationSTRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION
Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;
More informationDeveloping the International Law Framework to Better Address Cyber Threats: Role of Non-Binding Instruments
1 Developing the International Law Framework to Better Address Cyber Threats: Role of Non-Binding Instruments J. Herbach 1 1 Centre for Conflict and Security Law, University of Amsterdam E-mail contact
More informationFive Principles for Shaping Cybersecurity Norms
TRANSPARENCY PROPORTIONALITY HARMONIZATION RISK REDUCTION COLLABORATION Five Principles for Shaping Cybersecurity Norms Contents Introduction 3 Cybersecurity Norms 5 The Role of the Public Sector 6 Cybersecurity
More informationUN Human Rights Council UNITED KINGDOM 2014-2016 candidate
UN Human Rights Council UNITED KINGDOM 2014-2016 candidate The UK is a passionate, committed and effective defender of human rights. We are seeking election to the UN Human Rights Council for the term
More informationUNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction
UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE 16 April 2014 (Highlighted in yellow below) Introduction 1. The Global Multistakeholder Meeting on the Future of Internet
More informationECOWAS COMMON POSITION ON THE ARMS TRADE TREATY
COMISSÂO DA CEDEAO ECOWAS COMMISSION COMMISSION DE LA CEDEAO ECOWAS COMMON POSITION ON THE ARMS TRADE TREATY COTONOU, DECEMBER 2010 1 BACKGROUND AND JUSTIFICATION 1. During its 55 th plenary meeting on
More informationDRAFT GUIDELINES ON DECENTRALISATION AND THE STRENGTHENING OF LOCAL AUTHORITIES
DRAFT GUIDELINES ON DECENTRALISATION AND THE STRENGTHENING OF LOCAL AUTHORITIES 1 INTRODUCTION Sustainable human settlements development can be achieved through the effective decentralization of responsibilities,
More informationGLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT
GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical
More informationCybersecurity in the Commonwealth: Setting the Stage
Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if
More informationBangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice
Bangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice We, the States Members of the United Nations, Having assembled at the Eleventh United Nations Congress
More informationCyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual
More informationPROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
More informationCyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
More informationONLINE GAMBLING WHEN THE REALITY OF THE VIRTUAL CATCHES UP WITH US
ONLINE GAMBLING WHEN THE REALITY OF THE VIRTUAL CATCHES UP WITH US Gouvernement du Québec, 2014 INTRODUCTION On February 10, 2010, the Québec government announced, in the Gazette officielle du Québec,
More information1 FAM 330 BUREAU OF INTERNATIONAL ORGANIZATION AFFAIRS (IO)
1 FAM 330 BUREAU OF INTERNATIONAL ORGANIZATION AFFAIRS (IO) (Office of Origin: EUR-IO/EX) 1 FAM 331 ASSISTANT SECRETARY FOR INTERNATIONAL ORGANIZATION AFFAIRS 1 FAM 331.1 Assistant Secretary Responsibilities
More informationGovernment Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
More informationICT4Peace: Strategic use of ICT for Crisis Management 1 High- Level Working Lunch, 15 th November 2007
ICT4Peace: Strategic use of ICT for Crisis Management 1 High- Level Working Lunch, 15 th November 2007 The Permanent Representative of Switzerland hosted a High- Level working Lunch, on 15 November 2007.
More informationDraft resolution submitted by the President of the General Assembly
United Nations A/70/L.33 General Assembly Distr.: Limited 13 December 2015 Original: English Seventieth session Agenda item 17 Information and communications technologies for development Draft resolution
More informationPeaceful and Just Societies: A Key Factor in Financing for Sustainable Development
Peaceful and Just Societies: A Key Factor in Financing for Sustainable Development Input to the third Financing for Development Conference Published: May 2015 Recommendations: 1. Include language in the
More informationGovernment Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
More informationRECOMMENDATION CONCERNING THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL ACCESS TO CYBERSPACE
RECOMMENDATION CONCERNING THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL ACCESS TO CYBERSPACE UNESCO, Paris CONTENTS PREAMBLE... 1 Development of multilingual content and systems... 2 Facilitating
More informationAdopted by the Security Council at its 5430th meeting, on 28 April 2006
United Nations S/RES/1674 (2006) Security Council Distr.: General 28 April 2006 Resolution 1674 (2006) Adopted by the Security Council at its 5430th meeting, on 28 April 2006 The Security Council, Reaffirming
More informationPromoting Human Rights and Fundamental Freedoms for All : Australia s Engagement with the UN Human Rights Council
Promoting Human Rights and Fundamental Freedoms for All : Australia s Engagement with the UN Human Rights Council Issue The work, functioning and status of the United Nations Human Rights Council will
More informationCENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.
CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE The early 21st century has been defined by the Internet,
More informationWorking Party on Information Security and Privacy
Unclassified DSTI/ICCP/REG(2003)5/REV1 DSTI/ICCP/REG(2003)5/REV1 Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 02-Jul-2003
More informationCyber Security Strategy
2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...
More informationThe United Nations Convention against Corruption An Overview
The United Nations Convention against Corruption An Overview The United Nations Convention against Corruption Adopted by the General Assembly: Resolution 58/4, 31 October 2003 Entry into Force: 14 December
More informationTHE GLOBAL AGENDA FOR SOCIAL WORK AND SOCIAL DEVELOPMENT COMMITMENT TO ACTION March 2012
THE GLOBAL AGENDA FOR SOCIAL WORK AND SOCIAL DEVELOPMENT COMMITMENT TO ACTION March 2012 OUR COMMITMENTS As social workers, educators and social development practitioners, we witness the daily realities
More informationGeneral Assembly. United Nations A/66/359
United Nations A/66/359 General Assembly Distr.: General 14 September 2011 Original: English Sixty-sixth session Item 93 of the provisional agenda* Developments in the field of information and telecommunications
More informationDraft Resolution on Science, technology and innovation for development
1 Draft Resolution on Science, technology and innovation for development The Economic and Social Council, Recognizing the role of the Commission on Science and Technology for Development as the United
More informationCYBERSECURITY INDEX OF INDICES
Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration
More informationDear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference.
Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. The following pages intend to guide you in the research of the topics that will be debated at MMUN
More informationDEPARTMENT OF ECONOMIC AND SOCIAL AFFAIRS Division for Social Policy and Development Secretariat of the Permanent Forum on Indigenous Issues
PFII/2015/EGM Original: English UNITED NATIONS NATIONS UNIES DEPARTMENT OF ECONOMIC AND SOCIAL AFFAIRS Division for Social Policy and Development Secretariat of the Permanent Forum on Indigenous Issues
More informationSUMMARY. This item has been included in the provisional agenda of the 196th session of the Executive Board at the request of Austria and Italy.
Executive Board Hundred and ninety-sixth session 196 EX/32 PARIS, 19 March 2015 Original: English Item 32 of the provisional agenda UNESCO S ROLE AND RESPONSIBILITIES IN IMPLEMENTING GLOBAL CITIZENSHIP
More informationEnsuring protection European Union Guidelines on Human Rights Defenders
Ensuring protection European Union Guidelines on Human Rights Defenders I. PURPOSE 1. Support for human rights defenders is already a long-established element of the European Union's human rights external
More informationLegal protection of children from sexual exploitation: The Lanzarote Convention and the ONE in FIVE campaign
PARLIAMENTS UNITED in combating sexual violence against children Legal protection of children from sexual exploitation: The Lanzarote Convention and the ONE in FIVE campaign Tanja Kleinsorge Head of the
More informationDECISION No. 1049 OSCE STRATEGIC FRAMEWORK FOR POLICE-RELATED ACTIVITIES
PC.DEC/1049 Organization for Security and Co-operation in Europe Permanent Council Original: ENGLISH 922nd Plenary Meeting PC Journal No. 922, Agenda item 6 DECISION No. 1049 OSCE STRATEGIC FRAMEWORK FOR
More informationThe Bangkok Charter for Health Promotion in a Globalized World
The Bangkok Charter for Health Promotion in a Globalized World Introduction Scope The Bangkok Charter identifies actions, commitments and pledges required to address the determinants of health in a globalized
More information(COSAC) CONTRIBUTION OF THE XLI COSAC
Conference of Community and European Affairs Committees of Parliaments of the European Union (COSAC) CONTRIBUTION OF THE XLI COSAC Prague, 10-12 May 2009 1. Current Economic and Financial Situation 1.1
More informationACCESSIBLE INFORMATION PROVISION FOR LIFELONG LEARNING KEY POLICY MESSAGES
ACCESSIBLE INFORMATION PROVISION FOR LIFELONG LEARNING KEY POLICY MESSAGES Introduction The purpose of this paper is to give an overview of the conclusions and recommendations of the European Agency for
More informationI. CONTEXT II. POLITICAL PRIORITIES IDENTIFIED
SHAPING THE FUTURE OF EQUALITY POLICIES IN THE EU JOINT HIGH LEVEL EVENT ON NON-DISCRIMINATION AND EQUALITY, ROME, 6-7 NOVEMBER 2014 SUMMARY AND MAIN CONCLUSIONS I. CONTEXT The Italian Presidency of the
More informationDiversity of Cultural Expressions INTERGOVERNMENTAL COMMITTEE FOR THE PROTECTION AND PROMOTION OF THE DIVERSITY OF CULTURAL EXPRESSIONS
Diversity of Cultural Expressions 1.EXT.IGC Distribution limited CE/08/1.EXT.IGC/Dec. Rev. 2 Paris, 20 August 2008 Original: English / French INTERGOVERNMENTAL COMMITTEE FOR THE PROTECTION AND PROMOTION
More informationOuagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children
Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Introduction This booklet contains the Ouagadougou Action Plan to Combat Trafficking in Human Beings, Especially
More informationEducation 2030: Towards inclusive and equitable quality education and lifelong learning for all. ED/WEF2015/MD/3 Original: English
Education 2030: Towards inclusive and equitable quality education and lifelong learning for all ED/WEF2015/MD/3 Original: English 1. We, Ministers, heads and members of delegations, heads of agencies and
More informationRECOMMENDATIONS ON FOLLOW-UP TO THE MANDATE
Mandate of the Special Representative of the Secretary-General (SRSG) on the Issue of Human Rights and Transnational Corporations and other Business Enterprises RECOMMENDATIONS ON FOLLOW-UP TO THE MANDATE
More informationResolution adopted by the General Assembly on 19 December 2014. [on the report of the Second Committee (A/69/465)]
United Nations A/RES/69/204 General Assembly Distr.: General 21 January 2015 Sixty-ninth session Agenda item 16 Resolution adopted by the General Assembly on 19 December 2014 [on the report of the Second
More informationBuilding peace and security for all
Building peace and security for all Canada s Action Plan for the Implementation of United Nations Security Council Resolutions on Women, Peace and Security PURPOSE This Action Plan is intended to guide
More informationIGF Policy Options for Connecting the Next Billion
Introduction IGF Policy Options for Connecting the Next Billion - A Synthesis - More than three billion people will be connected to the Internet by the end of 2015. This is by all standards a great achievement,
More informationTowards a Common Understanding of the Roles and Responsibilities of all Stakeholders in Internet Governance
3 April 2005 Towards a Common Understanding of the Roles and Responsibilities of all Stakeholders in Internet Governance 1. Introduction The Working Group on Internet Governance (WGIG) has as one of its
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More informationHow To Strengthen Nuclear Security
COUCIL OF TH UROPA UIO N The Hague, 25 March 2014 8193/14 (OR. en) PRSS 187 The Hague uclear Security Summit Communiqué We, the leaders, met in The Hague on 24 and 25 March 2014 to strengthen nuclear security,
More informationContribution by. Ms. Emily Taylor. Enhanced cooperation. Ms. Emily Taylor Internet Governance Consultant
THE UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT 15 TH SESSION 21 25 May 2012 Geneva Contribution by Ms. Emily Taylor Enhanced cooperation Ms. Emily Taylor Internet Governance Consultant
More informationThe UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
More informationStrategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
More informationProposed medium-term plan for the period 2002-2005
United Nations A/55/6 (Prog. 9) General Assembly Distr.: General 18 April 2000 Original: English Fifty-fifth session Item 120 of the preliminary list* Programme planning Contents Proposed medium-term plan
More informationUNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT Chairman s draft recommendations on the basis of the consolidated version of the rolling document A. Shaping the outcomes of IGF meetings
More informationGAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony
GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency
More informationASEAN COMMUNITY VISION 2025
ASEAN COMMUNITY VISION 2025 ASEAN Community Vision 2025 ASEAN COMMUNITY VISION 2025 1. We, the Heads of State/Government representing the peoples of the Member States of the Association of Southeast Asian
More informationworking group on foreign policy and grand strategy
A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established
More informationBORDER SECURITY AND MANAGEMENT CONCEPT
MC.DOC/2/05 Organization for Security and Co-operation in Europe Ministerial Council Ljubljana 2005 Original: ENGLISH Second day of the Thirteenth Meeting MC(13) Journal No. 2, Agenda item 8 BORDER SECURITY
More informationGlobal Leaders' Meeting on Gender Equality and Women's Empowerment: A Commitment to Action 27 September 2015, New York
Global Leaders' Meeting on Gender Equality and Women's Empowerment: A Commitment to Action 27 September 2015, New York EU and its Member States' Commitments to the full, effective and accelerated implementation
More informationCONVENTION ON THE RECOGNITION OF STUDIES, DIPLOMAS AND DEGREES CONCERNING HIGHER EDUCATION IN THE STATES BELONGING TO THE EUROPE REGION PREAMBLE
CONVENTION ON THE RECOGNITION OF STUDIES, DIPLOMAS AND DEGREES CONCERNING HIGHER EDUCATION IN THE STATES BELONGING TO THE EUROPE REGION PREAMBLE The States of the Europe Region, Parties to this Convention,
More informationThe internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
More informationASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
More informationRwanda. Strategy for Sweden s development cooperation with 2015 2019 MFA
MINISTRY FOR FOREIGN AFFAIRS, SWEDEN UTRIKESDEPARTEMENTET Strategy for Sweden s development cooperation with Rwanda 2015 2019 MFA 103 39 Stockholm Telephone: +46 8 405 10 00, Web site: www.ud.se Cover:
More informationDeclaration on the 20th Anniversary of the Barents Euro-Arctic Cooperation. (Kirkenes, Norway, 3 4 June 2013)
1 Declaration on the 20th Anniversary of the Barents Euro-Arctic Cooperation (Kirkenes, Norway, 3 4 June 2013) Prime Ministers and other high-level representatives of the members of the Barents Euro- Arctic
More informationJOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU's comprehensive approach to external conflict and crises
EUROPEAN COMMISSION HIGH REPRESENTATIVE OF THE EUROPEAN UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY Brussels, 11.12.2013 JOIN(2013) 30 final JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL
More informationMinisterial Declaration of The Hague on Water Security in the 21st Century
Ministerial Declaration of The Hague on Water Security in the 21st Century 1. Water is vital for the life and health of people and ecosystems and a basic requirement for the development of countries, but
More informationUN Emergency Summit on Cyber Security Topic Abstract
UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international
More information2. Cyber legislation harmonization process in Central Africa
Introduction 1. What is cyber legislation? 2. Cyber legislation harmonization process in Central Africa The sub-region concerned; Partner international organizations in the harmonization of cyber legislation
More information