(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
|
|
|
- Arnold Logan
- 10 years ago
- Views:
Transcription
1 (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement strategy that spans the full range of U.S. economic, national security, public safety and privacy interests in cyberspace. Before the United States can effectively engage its foreign partners, the U.S. Government first needs to make national level decisions to: Identify and prioritize U.S. national interests in cyberspace; Review existing U.S. Government policy positions regarding cybersecurity; Consider the strategic connections and possible contradictions between the numerous U.S. Government policy objectives for cybersecurity; Develop new or refined positions regarding cybersecurity (where needed); Effectively engage the private sector, since it comprises the owners and operators of a majority of the information and communications infrastructure; Prioritize multi lateral forums, coordinate positions in them with our close allies and other foreign partners, and assess the appropriate U.S. Government representation for those events; Prioritize countries that pose the greatest challenges or opportunities for bi lateral engagement on cybersecurity issues; and Move forward with coordinated diplomacy and outreach efforts across the executive branch, including more proactive and targeted engagement to advance agreed upon U.S. positions. (U//FOUO) Based on the feedback that departments and agencies provided to the 60 day cyberspace policy review team and discussions with key allies and members of the private sector, the priority topics for international engagement can be conceptually organized into three broad categories: Internet governance, international law and security, and multi lateral public policy. Recognizing that several of the issues identified within these categories have implications extending beyond cybersecurity and require broader coordination, they all have a significant international component involving cybersecurity that requires attention. All three categories should be addressed in a coordinated fashion to advance national objectives of global prosperity and security. First, Internet governance refers to the decision making process for developing secure architectures, technical standards, administrative procedures, and best practices at the international level and ensure the secure, resilient and operation of the Internet. Second, because cyberspace now constitutes the primary domain for global communications and commerce, it has become a critical national asset for many nations. This criticality may lead to reexamination of traditional questions of public international law and military doctrine (e.g., strategic deterrence) in this new context. Third, because of the global nature of communications networks, an array of public policy, regulatory, and law enforcement issues that are being addressed within independent domestic jurisdictions have wider ramifications for the United States and other countries. Domestic SECRET//REL TO FVEY E 1
2 policies developed in isolation could significantly hamper necessary interoperability and cooperation at both the regional and international levels. Better coordination is required so that competing policy interests (e.g., data privacy, security, commercial innovation, etc.) are balanced by individual countries in ways that account for the global effects of those policies. (U//FOUO) Each of those three general areas, in turn, encompasses both substantive issues for determination and procedural considerations for international engagement. Not only should the U.S. Government reach its own policy decisions on specific issues after concerted discussion within the U.S. Government and with our allies, but it should also strategize how best to engage the rest of the world to support these positions. Key to that process will be public private exchanges within the United States as well as careful selection of the multi lateral forums that are best suited to considering, deciding, and advancing each aspect of international cybersecurity policy. The United States and its allies should select forums for affirmative policy advancement and recognize where it is necessary to participate in others for defensive reasons. The multiplicity of international organizations currently striving to set international policy in cyberspace, with some developing as independent proponents of policy, is taxing many countries abilities to staff participation in those organizations and track their respective activities. This situation poses the risk of producing disjointed, conflicting, or incomplete solutions while allowing some countries to advance interests adverse to the United States or its allies in forums where engagement by the United States is insufficient. (U) Internet Governance, Technical Oversight, and Standards Issues (U//FOUO) One of the U.S. Government s highest priorities should be to determine, in concert with its close allies and other partners in the international community of Internet users, how to ensure the continued stability and global interoperability of the Internet, while increasing security and reliability for all users. A core component of this endeavor is how to ensure the secure and efficient operation of the domain name and addressing system (DNS). (U//FOUO) Enhancing the security of the global Internet will require the identification, development, and deployment of new technical architectures; improved engineering standards and protocols; and possibly the adoption of revised best practices. Immediate issues in this area include assessment of the strategic options for deployment of the DNS security extensions protocol (DNSSEC) in the root zone, for encouraging its deployment throughout the Internet infrastructure, and for facilitating the smooth migration to Internet Protocol version 6 (IPv6). Other areas warranting attention include (but are not limited to) research and development of new methods and capabilities for identity management and authentication for certain types of online activity. Currently, these technical issues are being discussed in a range of specialized organizations like the Internet Engineering Task Force (IETF), the Institute of Electrical and Electronics Engineers (IEEE), and the International Telecommunication Union (ITU). As information and communications technologies continue to evolve, standards bodies will need to be able to adapt, identify, and promulgate new best practices and needed technical standards to address emerging needs of the next generation architecture. The United States and its foreign partners should develop an action plan for working in these various forums to advance agreed upon strategic objectives in the standards area. (U//FOUO) Finally, apart from the foregoing technical and operational matters, a broad range of other multi lateral public policy issues also emanate from the operation of the Internet. These issues, some of which are more generally discussed below, hold strategic implications for the United States and its allies and cannot be fully or comprehensively addressed in any individual forum. They are presently the SECRET//REL TO FVEY E 2
3 subject of action in a range of organizations including the Internet Corporation for Assigned Names and Numbers (ICANN), the Internet Governance Forum (IGF), the ITU, and other broader, multi lateral venues such as the United Nations (UN), the G 8, the Organization for Economic Cooperation and Development (OECD), the Organization for Security and Cooperation in Europe (OSCE), and the Organization of American States (OAS). While recognizing that the international dialogue on these various issues should (and invariably will) continue in multiple forums, the United States and its foreign partners should assess for each strategic objective which forums are most advantageous for achieving desired outcomes. (U) International Law and Security (S//REL TO FVEY) The international community has not yet achieved consensus on several key concepts of international law as they pertain to cyberspace. Different countries apply the traditional legal notions of territorial jurisdiction, use of force, and humanitarian law inconsistently in the cyberspace context. Accordingly, the United States needs to consider how to establish collective, acceptable international norms and redlines for nation state conduct in cyberspace. Before engaging in that dialogue, the U.S. Government should first balance the need for increased international cybersecurity with its own need to develop and employ cyber capabilities to protect U.S. national security. Given the growing dependence of all sectors of our society on the Internet, the United States also needs to recognize that the international scale of cybercrime, because of the growing severity of its cumulative effects, increasingly constitutes a national security concern in its own right. (S//REL TO FVEY) Several international efforts are under way to define and address evolving concepts of cyber arms control, cyberterrorism, and cybercrime. For example, the Russian Federation has advanced the position in the UN, OSCE, and a plethora of other forums that a new arms control regime is required for cyberspace. The United States does not concur with the Russian position or a related argument they make that a new international instrument is required to deal with cyberterrorism (where that term is used to describe terrorist attacks on information systems). The United States position has been that no new international agreements are needed in these areas and that work should instead focus on implementing strong cybersecurity and cybercrime provisions. With respect to cybercrime laws, the United States advocates the Council of Europe s Convention on Cybercrime as a way of building a common substantive and procedural criminal legal framework in countries around the world. Although the U.S. has worked with other countries on terrorist use of the Internet, that topic presents a number of challenges including differing legal protections for content and differing views on tactics and information sharing. The U.S. Government should take an active role in shaping international norms through its own diplomatic efforts, capacity building and military practices. The United States will need to determine its own national interests regarding a range of issues in cyberspace, carefully select the preferred forums for international policy development, and devise both affirmative and defensive issue positions that will enlist the support of other countries. (S//REL TO FVEY) In addition, the United States and our allies will need to develop new technical capabilities, doctrines, and rules of engagement premised on any substantive future cybersecurity norms that are recognized by the international community. In the absence of effective technical methods for the timely attribution of cyber incidents, reliance on legal authorities that make theoretical distinctions between armed attacks, terrorism, and criminal activity may prove impractical. Moreover, what constitutes a proportional response in cyberspace is complicated by the fact that both public and private networks may be affected by a cyber action. Consideration should also be given to diplomatic and sovereignty issues where the networks of friendly countries are affected by a response. Another SECRET//REL TO FVEY E 3
4 key implementation priority is strategic deterrence. The United States should decide how state and non state actors can be deterred, taking into account the general lack of credible verification procedures and reliable attribution methods. (U) Multi Lateral Public Policy (U//FOUO) The global nature of cyberspace requires unprecedented cooperation to foster commercial interoperability, protect critical infrastructures, and enable effective transnational law enforcement. Cooperation and some consistent capability is required, in part, due to a weakest link problem; because malicious actors can easily route electronic attacks through the country with weakest domestic law, capacity or political will, every country needs robust, and relatively consistent, capabilities. The current discrepancies in national (or regional) data protection laws, substantive and procedural domestic criminal statutes, forensic capabilities, and investigative capacity all pose obstacles to international cooperation. By establishing consistent norms for non state actors in cyberspace, ensuring that there is sufficient capacity and prioritization, and building and strengthening transnational cooperative networks for law enforcement and network defense, the international community could improve global critical infrastructure protection and law enforcement. Consideration of civil liberties, privacy rights, and other human rights, coupled with the recognition that good cybersecurity and law enforcement should enhance privacy, will be an integral part of this effort. (U//FOUO) Accordingly, the United States, working with its allies, should continue to promote domestic legal structures, cooperative mechanisms, and national best practices in countries around the world. The United States will also need to prioritize resources (i.e., time, money, and personnel) and leverage the resources of its allies to build capacity through legislative, investigative, technical and other training of foreign partners. Moreover, in order to implement any mutually agreed policies, the United States will need to support greater information sharing both with other governments and the private sector (especially of time sensitive and classified information, as necessary). Better information sharing will require identification of the best channels to use to share information, determination of the parties with whom it should be shared, and consideration of how information can be shared with multi national companies. (U//FOUO) Many of these substantive issues are already being discussed by international organizations, including the G 8, COE, EU, OSCE, and OECD. Implementation measures are also being pursued bilaterally with close allies, through U.S. led regional programs, and through international organizations, such as the UN, the International Telecommunications Union, the North Atlantic Treaty Organization (NATO), the OAS, and the Asia Pacific Economic Cooperation (APEC) forum. Once again, the selection of preferred forums for international engagement on each relevant cybersecurity policy topic, and the prioritization of those topics, will eliminate redundancy, focus debate, and achieve more effective solutions. (U//FOUO) The United States should also recognize and develop a strategy to address the domestic actions of countries that have a profound effect on U.S. businesses and security. As storage of computer data moves to the cloud, countries are increasingly requiring the data of its respective citizens be stored within its borders. Although the United States has occasionally required this as a condition of approving changes of ownership, it has no comprehensive policy on this issue. Some countries increasingly have demanded data from U.S. providers through subsidiaries of those companies located or operating within the foreign territory, even when access to that data, stored in the United States requires more stringent legal procedures under U.S. law. In addition, countries also have demanded SECRET//REL TO FVEY E 4
5 access to the source code of companies software products as a condition of doing business in their jurisdictions. Censorship and free speech concerns are implicated when countries have laws restricting certain kinds of speech protected in the United States and try to apply that law to U.S. providers. Promotion of free speech is an even greater concern when authoritarian regimes seek to censor speech and put pressure on U.S. providers and subsidiaries to that end. SECRET//REL TO FVEY E 5
6 SECRET//REL TO FVEY
Michael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION
Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual
International Strategy on Cybersecurity Cooperation
資 料 9-2 International Strategy on Cybersecurity Cooperation - j-initiative for Cybersecurity - October 2, 2013 Information Security Policy Council Contents 1 Objectives 1 2 Basic Principles 2 2.1 Ensuring
Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge
Cybercrime Bedrohung, Intervention, Abwehr BKA-Herbsttagung vom 12. - 13. November 2013 Cybersecurity strategic-political aspects of this global challenge Full version Michael Daniel Special Assistant
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN)
Final Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN) Opening Speech to the Second International Forum Partnership Among State, Business
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents
Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Catherine Lotrionte and Eneken Tikk, co-chairs Cyber security and the acceptable behavior of state and non-state
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
Cyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
Public Private Partnerships and National Input to International Cyber Security
Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
Establishing and supporting CERTs for Internet security
Report on the Activities of the IGF Best Practice Forum (BPF) for: Establishing and supporting CERTs for Internet security Cristine Hoepers, CERT.br/NIC.br Maarten Van Horenbeeck, FIRST Adli Wahid, FIRST
Five Principles for Shaping Cybersecurity Norms
TRANSPARENCY PROPORTIONALITY HARMONIZATION RISK REDUCTION COLLABORATION Five Principles for Shaping Cybersecurity Norms Contents Introduction 3 Cybersecurity Norms 5 The Role of the Public Sector 6 Cybersecurity
Legal Issues / Estonia Cyber Incident
Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia
Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY
Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.
National Cyber Security Strategies: United States
National Cyber Security Strategies: United States Audrey L. Plonk Director, Cybersecurity and Internet Governance Intel Corporation 1 ICSS 2013 Trends: National Cybersecurity Strategies New strategies
ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Department of Homeland Security Information Sharing Strategy
Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction
Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.
CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE The early 21st century has been defined by the Internet,
ITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
Active Engagement, Modern Defence
Strategic Concept For the Defence and Security of The Members of the North Atlantic Treaty Organisation Adopted by Heads of State and Government in Lisbon Active Engagement, Modern Defence Preface We,
CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
Partnership for Cyber Resilience
Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage
Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review
Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review About auda.au Domain Administration Ltd (auda) is the industry self regulatory, not for profit
A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010
1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue
COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY,
COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, 28-29 JUNE 2011 The Seoul Declaration on the Future of the Internet Economy adopted at the 2008 OECD
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Cyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing
2374-19. Joint ICTP-IAEA School of Nuclear Energy Management. 5-23 November 2012. Nuclear Security Fundamentals Module 9 topic 2
2374-19 Joint ICTP-IAEA School of Nuclear Energy Management 5-23 November 2012 Nuclear Security Fundamentals Module 9 topic 2 EVANS Rhonda, IAEA Department of Nuclear Safety and Security Office of Nuclear
Cyber Security Strategy
2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...
The main object of my research is :
The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is
BORDER SECURITY AND MANAGEMENT CONCEPT
MC.DOC/2/05 Organization for Security and Co-operation in Europe Ministerial Council Ljubljana 2005 Original: ENGLISH Second day of the Thirteenth Meeting MC(13) Journal No. 2, Agenda item 8 BORDER SECURITY
Accountability: Data Governance for the Evolving Digital Marketplace 1
Accountability: Data Governance for the Evolving Digital Marketplace 1 1 For the past three years, the Centre for Information Policy Leadership at Hunton & Williams LLP has served as secretariat for the
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects
working group on foreign policy and grand strategy
A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established
EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on
TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members
S. ll IN THE SENATE OF THE UNITED STATES
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015:
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January 2013 www.coe.int/terrorism A. National policy 1. Is there a national
National Cyber Security Strategy 2015-2017
National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.
The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015
The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 I. Defense Cooperation and the Aim of the Guidelines In order to ensure Japan s peace and security under any circumstances, from peacetime
GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT
GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical
BSA GLOBAL CYBERSECURITY FRAMEWORK
2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
Toward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership
Joint Statement of the Security Consultative Committee Toward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership June 21, 2011 by Secretary of State Clinton Secretary of Defense
Honourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:
Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice
TITLE III JUSTICE, FREEDOM AND SECURITY
TITLE III JUSTICE, FREEDOM AND SECURITY Article 14 The rule of law and respect for human rights and fundamental freedoms In their cooperation on justice, freedom and security, the Parties shall attach
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
Cybersecurity. Canisius College
Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never
ICANN STRATEGIC PLAN JULY 2012 JUNE 2015
ICANN STRATEGIC PLAN JULY 2012 JUNE 2015 One World. One Internet. One World. One Internet. ICANN is the global organization that coordinates the Internet s unique identifier systems for worldwide public
RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES
RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES Purpose and Scope The purpose of the Security Code of Management Practices is to help protect people, property, products, processes, information and
How Effective are International Approaches for Global Cyber Security?
International Pugwash Workshop: Cyberwar & Cyberpeace How Effective are International Approaches for Global Cyber Security? Berlin, 23 October 2015 1 Numerous states are pursuing military cyber-capabilities.
* * * Initial Provisions for. CHAPTER [ ] - Regulatory Cooperation
REMARKS: This is an initial textual proposal for a draft Chapter on Regulatory Cooperation that the Commission intends to submit to the US on Friday, 30 January, in preparation of the 8 th round of TTIP
Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework
Executive Report to the CACP Board of Directors from CACP Global 2015 Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework In the fall of 2014, the CACP Board of Directors assigned
ASEAN s Cooperation on Cybersecurity and against Cybercrime
ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms
UN Emergency Summit on Cyber Security Topic Abstract
UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international
Cyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
OUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
Draft WGIG issue paper on Network and Information Security
Draft WGIG issue paper on Network and Information Security This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members,
AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION)
AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION) AG/RES. 2004 (XXXIV-O/04) ADOPTION OF A COMPREHENSIVE INTER-AMERICAN STRATEGY TO COMBAT THREATS TO CYBERSECURITY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note
Principles of Oversight and Accountability For Security Services in a Constitutional Democracy Introductory Note By Kate Martin and Andrzej Rzeplinski The 1990 s saw remarkable transformations throughout
PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
Privacy in the Cloud A Microsoft Perspective
A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft
Cyberspace Situational Awarness in National Security System
Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, [email protected], [email protected]
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
Promoting Cross Border Data Flows Priorities for the Business Community
Promoting Cross Border Data Flows Priorities for the Business Community The movement of electronic information across borders is critical to businesses around the world, but the international rules governing
Seoul Communiqué 2012 Seoul Nuclear Security Summit
Seoul Communiqué 2012 Seoul Nuclear Security Summit We, the leaders, gathered in Seoul on March 26-27, 2012, renew the political commitments generated from the 2010 Washington Nuclear Security Summit to
CEAS ANALYSIS. of the Law on Amendments of the Law on the Security Intelligence Agency
CEAS ANALYSIS of the Law on Amendments of the Law on the Security Intelligence Agency Belgrade, July 2014. CEAS is supported by the Rockefeller Brother s Fund The views and analysis in this report do not
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities
Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities Luca Castellani Secretary, Working Group IV (Electronic Commerce)
PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection
More Intelligent, More Effective Cybersecurity Protection January 2013 Business Roundtable (BRT) is an association of chief executive officers of leading U.S. companies with more than $7.3 trillion in
Draft WGIG Issues Paper on E-Commerce
Draft WGIG Issues Paper on E-Commerce This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members, but it does not
Cybersecurity and the Romanian business environment in the regional and European context
KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory
