Capacity building on cybercrime: The example of GLACY and GLACY+

Similar documents
Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

CYBERCRIME AND THE LAW

Cybercrime & Cybersecurity

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum April 2013 Yaoundé, Cameroon

The Sahel and Indian Ocean Commission Judicial Platforms

24/7 High Tech Crime Network

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Combating Tax Evasion through Transparency and Exchange of Information

Australia s proposed accession to the Council of Europe Convention on Cybercrime

J O I N T D E C L A R A T I O N

Cyber Crime and Data Retention

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July December 2016

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

CoE/EU Eastern Partnership Programmatic Co-operation Framework (PCF) Theme II Ensuring Justice

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in :

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

DATE: 1 APRIL Introduction

Global Cybersecurity Index Good Practices

Appendix 1: Full Country Rankings

Cybersecurity in the Commonwealth: Setting the Stage

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit

Support period and budget frame, expenditures to date:

Cybersecurity for ALL

Camden Asset Recovery Inter-Agency Network (CARIN)

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

Eurojust s Multi-annual. Strategic Plan Organisational developments. Centre of expertise. Operational work. Partners

The EU approach to Cybersecurity and Cybercrime

Cyber Diplomacy A New Component of Foreign Policy 6

UNHCR, United Nations High Commissioner for Refugees

Cybercrime: Improving international cooperation

Regional Workshop on the Implementation of Rio Principle 10 in the Caribbean Region

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

Cyber ITU. By Tomas Lamanauskas, ITU

ADVOC. the international network of independent law firms

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Expert Group Meeting on the Technical and Legal Obstacles to the Use of Videoconferencing

VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION

THE G8 24/7 NETWORK OF CONTACT POINTS Protocol Statement

NSS 2014 UK NATIONAL PROGRESS REPORT. March 2014

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME

Peace and Justice in Cyberspace

Individuals, Societies, Cultures and Health

MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING

THE ICSID CASELOAD STATISTICS (ISSUE )

Report of the Strategic Meeting on Cybercrime

THE ICSID CASELOAD STATISTICS (ISSUE )

ALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union

COMMITTEE ON HEMISPHERIC SECURITY (CHS) ORGANIZATION OF AMERICAN STATES (OAS) Washington D.C., 17 February 2011

List of tables. I. World Trade Developments

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

The global challenge

Executive Director Centre for Cyber Victim Counselling /

Cyber Security Strategy of Georgia

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section

Cybersecurity Governance

Law enforcement in the clouds - challenges

INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Migration/ Asylum. Co-operation in the field of drugs

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

States Parties to the 1951 Convention relating to the Status of Refugees and the 1967 Protocol

Co-funded by the Prevention of and Fight against Crime Programme of the European Union. This project has been funded with support from the European

Electronic signature, authentication, identity management & UNCITRAL

The Importance of Credit Bureaus in Lending Decisions

EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}

OAS CYBER SECURITY INITIATIVE. Global Forum on Cyber Expertise (GFCE)

Honourable members of the National Parliaments of the EU member states and candidate countries,

HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS

Key Trends in Outsourced Contact Centers. 12 Congreso Andino, April 2015 Peter Ryan, Principal Analyst

Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth

U.S. Government Law Enforcement Training Programs in the Americas

8674/15 MC/pf 1 DGD 1B

Independent Evaluation of Project Childhood MANAGEMENT RESPONSE

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) FRAMEWORK OVERALL ACTION PLAN FOR THE WORK OF THE CCPE

I. World trade developments

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

Computer Facilitated Crimes Against Children International Law Enforcement Training

EU support for climate training in LDCs: some examples

ASEAN s Cooperation on Cybersecurity and against Cybercrime

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

Meeting of Commonwealth Law Ministers and Senior Officials

AGREEMENT ON PORT STATE MEASURES TO PREVENT, DETER AND ELIMINATE ILLEGAL, UNREPORTED AND UNREGULATED FISHING

U.S. Trade Overview, 2013

Asset and Income Disclosure for Judges: A Summary Overview and Checklist By Keith E. Henderson*

Twelfth United Nations Congress on Crime Prevention and Criminal Justice

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

PROJECT FICHE

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

Working Party on General Matters including Evaluations (GENVAL) Seventh round of mutual evaluations - Questionnaire

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

WORKSHOP REPORT ON EFFECTIVE CYBERCRIME LEGISLATION IN EASTERN AFRICA DAR ES SALAAM, TANZANIA, AUGUST

Accounting Education a World Wide Benchmark Prof. J.P.J. (Hans) Verkruijsse PhD RE RA

Wealth Accounting and Valuation of Ecosystem Services (WAVES): a Global Partnership. Natural Capital Accounting for Sustainable Development

After action report Bioterrorism TTEX «BIOSHIELD» Americas region Argentina, 14-16

The United Nations Convention against Corruption An Overview

Transcription:

GLACY Global Action on Cybercrime Action globale sur la cybercriminalité Global Forum on Cyber Expertise, Washington DC, 1-2 June 2016 Capacity building on cybercrime: The example of GLACY and GLACY+ Manuel DE ALMEIDA PEREIRA Project Manager Cybercrime Programme Office of the Council of Europe (C-PROC) Council of Europe Nayia BARMPALIOU Programme Manager, Cybersecurity and Organised Crime DG International Cooperation and Development, European Commission www.coe.int/cybercrime

Action on cybercrime: The approach of the Council of Europe 2 Follow up and assessments: Cybercrime Convention Committee (T-CY) 1 Common standards: Budapest Convention on Cybercrime and relates standards Protecting you and your rights in cyberspace Note: Capacity building is part of a consistent and dynamic approach 3 Capacity building: C-PROC Technical cooperation programmes 2 www.coe.int/cybercrime 2

Reach of the Budapest Convention / reach of capacity building 130+ Indicative Budapest Convention Ratified/acceded: 49 Signed: 6 Invited to accede: 11 = 66 49 6 11 Other States with laws/draft laws largely in line with Budapest Convention = 20 Further States drawing on Budapest Convention for legislation = 45+ map only

About the Budapest Convention on Cybercrime Opened for signature in Budapest, Hungary, in 2001 By 1 June 2016: 49 Parties (European, Australia, Canada, Dominican Republic, Israel, Japan, Mauritius, Panama, Sri Lanka, USA) 6 Signatories (European, South Africa) 11 States invited to accede (Argentina, Chile, Colombia, Costa Rica, Mexico, Morocco, Paraguay, Peru, Philippines, Senegal, Tonga) = 66 States 4 www.coe.int/cybercrime 4

5 www.coe.int/cybercrime 5 Budapest Convention: scope Criminalising conduct Illegal access Illegal interception Data interference System interference Misuse of devices Fraud and forgery Child pornography IPR-offences Procedural tools + + Harmonisation Expedited preservation Search and seizure Interception of computer data International cooperation Extradition MLA Spontaneous information Expedited preservation MLA for accessing computer data MLA for interception 24/7 points of contact

Budapest Convention: The role of the Cybercrime Convention Committee (T-CY) Established under Article 46 Budapest Convention Membership (May 2016): 49 Members (State Parties) 17 Observer States 12 organisations (African Union Commission, Commonwealth Secretariat, ENISA, European Union, Eurojust, Europol, INTERPOL, ITU, OAS, OECD, OSCE, UNODC) (Committee of Parties to the Budapest Convention) Functions: Assessments of the implementation of the Convention by the Parties Guidance Notes Draft legal instruments Two plenaries/year as well as Bureau and working group meetings An effective follow up mechanism The T-CY appears to be the main inter-governmental body on cybercrime matters internationally 6 www.coe.int/cybercrime 6

7 www.coe.int/cybercrime 7 Capacity building: The role of C-PROC 2013: Need to enhance capacities at the Council of Europe for capacity building on cybercrime and electronic evidence Decision by Committee of Ministers (October 2013) to establish a dedicated Programme Office in Bucharest, Romania Operational as from April 2014 Currently 18 staff Task: Support to countries worldwide to strengthen criminal justice capacities on cybercrime and electronic evidence

8 www.coe.int/cybercrime 8 European Union Council of Europe partnership EU CoE partnership on global capacity building against cybercrime Since 2010 in Western Balkans and Turkey Since 2011 in Eastern Partnership countries 2013: External cyber capacity building a strategic block of the EU Cybersecurity Strategy: Scaling up Global 2015: European Agenda on Security: Cybercrime an internal and external priority 2015: Agenda 2030: Linking cyber capacity building to EU s Development commitments

C-PROC Projects (Status May 2016) GLACY EU/COE Joint Project Global Action on Cybercrime GLACY+ EU/COE Joint Project Global Action on Cybercrime Cybercrime@EAP II EU/COE Eastern Partnership Cybercrime@EAP III EU/COE Eastern Partnership iproceeds EU/COE Joint Project: Targeting crime proceeds on the Internet Cybercrime@Octopus (voluntary contribution funded) 9 www.coe.int/cybercrime 9

GLACY Global Action on Cybercrime Action globale sur la cybercriminalité 10 www.coe.int/cybercrime 10 GLACY EU/COE Joint Project on Global Action on Cybercrime To enable criminal justice authorities to engage in international cooperation on cybercrime and electronic evidence on the basis of the Budapest Convention on Cybercrime Duration 36 months (Nov 2013 Oct 2016) Budget Funding EUR 3.35 million European Union (Instrument for Stability, IfS) and Council of Europe Geo scope Countries prepared to implement the Budapest Convention Parties, Signatories or Invitees. GLACY Priority countries Mauritius Senegal Tonga Morocco South Africa Philippines Sri Lanka

GLACY Global Action on Cybercrime Action globale sur la cybercriminalité Strategies and engagement of decision-makers Harmonisation of legislation Components/ Expected Results Judicial training Law enforcement capacities International cooperation Information sharing Assessment of progress

GLACY Global Action on Cybercrime Action globale sur la cybercriminalité Sequencing of activities

GLACY Global Action on Cybercrime Action globale sur la cybercriminalité Examples of recent activities: 21 23 March 2016 MAURITIUS 31 March 1 April 2016 31 March 3 April 2016 SENEGAL SRI LANKA 11-13 April 2016 SOUTH AFRICA 9-11 May 2016 Dakar, SENEGAL Examples of forthcoming activities: International workshop on adaptation and update of the electronic evidence guide through the development of Standard Operating Procedures, with participation of all GLACY countries Advisory mission on cybercrime reporting systems, combined with workshop on reporting systems and interagency cooperation Training of trainers/ Introductory Course on Cybercrime and Electronic Evidence for the judiciary International workshop on judicial training curricula integration, with participation of all GLACY countries International Workshop on "International Cooperation on Cybercrime and Electronic Evidence within ECOWAS/West Africa region" 30 June 1 July 2016 TONGA Advisory mission on cybercrime reporting systems, combined with workshop on reporting systems and interagency cooperation 15 22 June 2016 PHILIPPINES Digital data forensics and live data forensics for LE and CERT 14 15 July 2016 MOROCCO International workshop on effectiveness of legislation on cybercrime and electronic evidence measured through statistics 62 activities in 2015

14 www.coe.int/cybercrime 14 New capacity building programme GLACY+ GLACY+ EU/COE Joint Project on Global Action on Cybercrime Extended GLACY+ is to extend the experience of the GLACY project, which supports seven priority countries in Africa and the Asia-Pacific region. These countries may serve as hubs to share their experience within their respective regions. Moreover, countries of Latin America and the Caribbean as well as others in Africa may now also benefit from project support. Duration 48 months (Mar 2016 Feb 2020) Budget Funding GLACY+ Hub or priority countries EUR 10 million European Union (Instrument contributing to Stability and Peace) and Council of Europe Mauritius Senegal Tonga Dom. Republic Morocco South Africa Ghana Philippines Sri Lanka

GLACY+ Global Action on Cybercrime Extended Action Globale sur la Cybercriminalité Élargie 15 www.coe.int/cybercrime 15 To strengthen the capacities of States worldwide to apply legislation on cybercrime and electronic evidence and enhance their abilities for effective international cooperation in this area. CYBERCRIME AND CYBERSECURITY POLICIES AND STRATEGIES To promote consistent cybercrime and cybersecurity policies and strategies. POLICE AUTHORITIES AND INVESTIGATIONS To strengthen the capacity of police authorities to investigate cybercrime and engage in effective police-to-police cooperation with each other as well as with cybercrime units in Europe and other regions. CRIMINAL JUSTICE AND INTERNATIONAL COOPERATION To enable criminal justice authorities to apply legislation and prosecute and adjudicate cases of cybercrime and electronic evidence and engage in international cooperation.

16 www.coe.int/cybercrime 16 Capacity building on cybercrime: lessons learnt Factors of success: Capacity building backed up by common standards (example: Budapest Convention) and follow up mechanism (example: Cybercrime Convention Committee of the Parties) Political commitment to implement standards (Example: signature or formal request for accession to Budapest Convention) as a prerequisite for full range of support) Rule of law conditions: strengthening legislation, including safeguards for procedural powers, as starting point Sequencing of activities: Initial situation reports committing decision makers and counterpart organisations implementing activities assessing progress made feeding results back into policies Country project teams Example GLACY: cooperation with 7 x 5 institutions Capacities for capacity building C-PROC

Capacity building on cybercrime: lessons learnt A capacity building methodology Structured for institutional development and reform Ownership and bottom-up approach: inter-agency national project teams working towards meeting strategic objectives Sustainability: working with Judicial and Law Enforcement Academies, integrating cybercrime in their curricula Rights-based approach: throughout design and implementation Community of sharing: replicable and scalable material developed: manuals, informing also the broader cyber community (T-CY, Octopus) Trans-regional approach: an outlier - partnerships, crossfertilisation, ripple effect 17 www.coe.int/cybercrime 17

GLACY: Manuals and Studies STUDY REPORTS AND MANUALS All reports will be finalized by end of September 2016 Legal framework on Child Protection 0% Legal framework on Data Protection Cybercrime Statistics 10% 10% Study Report on Cybercrime Reporting Systems 50% Standard Operating Procedures 95% Guide for 24/7 points of contact Manual on International Cooperation 75% 75% Legal Framework on ISP Liability 100% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

GFCE 2016 Annual meeting 01-02 June 2016 THANK YOU Q&A Manuel DE ALMEIDA PEREIRA manuel.pereira@coe.int Phone: +40-799 875 216 www.coe.int/cybercrime