Michael Yakushev PIR-Center, Moscow (Russia)



Similar documents
Cyber Diplomacy A New Component of Foreign Policy 6

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents

The global challenge

Cybersecurity. Canisius College

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

The main object of my research is :

How To Understand And Understand The European Priorities In Information Security

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

the Council of Councils initiative

Cyber Security Strategy for Germany

Five Principles for Shaping Cybersecurity Norms

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Cybersecurity in the Commonwealth: Setting the Stage

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

Honourable members of the National Parliaments of the EU member states and candidate countries,

UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction

Harmful Interference into Satellite Telecommunications by Cyber Attack

working group on foreign policy and grand strategy

ITU National Cybersecurity/CIIP Self-Assessment Tool

United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes

An Overview of Large US Military Cybersecurity Organizations

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

S. ll IN THE SENATE OF THE UNITED STATES

How To Write An Article On The European Cyberspace Policy And Security Strategy

RUSSIA CHINA NEXUS IN CYBER SPACE

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

Cyber ITU. By Tomas Lamanauskas, ITU

Cybersecurity Governance

Peace and Justice in Cyberspace

Who are the Stakeholders in Internet Governance?

National Cyber Security Strategy

National Cyber Security Strategies

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum April 2013 Yaoundé, Cameroon

APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal

F A C T S H E E T. EU-US Summit (Brussels, 26 March 2014) and EU-US relations

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

Cyber Security Strategy of Georgia

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

How To Write A Letter To The World'S Leaders On The Ovemll Review

UN Emergency Summit on Cyber Security Topic Abstract

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

CYBERSECURITY INDEX OF INDICES

UN Security Council Resolution 1540: Monitoring and Detecting Breaches in Biosecurity & Illicit Trafficking of BW-Related Materials

Models for Cyber-legislation in ESCWA member countries

National Cyber Security Strategy of Afghanistan (NCSA)

DATE: 1 APRIL Introduction

Executive Director Centre for Cyber Victim Counselling /

ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int.

EU Cybersecurity: Ensuring Trust in the European Digital Economy

Cybersecurity for ALL

Liberty, Equality, Connectivity Transatlantic Cooperation on Cybersecurity Norms

Governmental Efforts and Strategies to Reinforce Security in Cyberspace

Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN)

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Lith Networking and Network Marketing Safety

The internet and digital technologies play an integral part

Draft WGIG Issues Paper on E-Commerce

MANAGING THE GLOBAL INTERNET ECONOMY: A NEW CHALLENGE FOR THE US AND JAPAN

INCO for Cyber Security. PTCIF: 21st Feb 2014

REPUBLIC OF POLAND Ministry of Administration and Digitisation, Internal Security Agency CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

Jyväskylä Cyber Security Ecosystem

DIGITAL AGENDA FOR LATIN AMERICA AND THE CARIBBEAN (elac2018)

Draft WGIG issue paper on Network and Information Security

Cybersecurity: Challenge and Response: A New Generation Speaks Out

Transcription:

Michael Yakushev PIR-Center, Moscow (Russia)

Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict: ICANN vs ITU (potential) Political/Military conflict: cyberwarfare 2013: Snowden case: what s new

Global understanding: Cyber-Security, security of the Internet, security of the cyberspace Russian interpretation: trinity of (Inter)National Security (e.g. preventing cyber-wars) Public Security (e.g. combating cyber-terrorism and cyber-extremism ) Private Security (e.g. countering cyber-crime) Russian terminology: International Information Security Compromise (Obama-Putin Joint Statement, 2013): issues of threats to or in the use of ICTs in the context of international security ICT stands for Information and Communication Technologies

Working Group of Internet Governance (Final Report, 2005): The development and application by Governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet. New Stakeholders: technical community, Academia, international organizations

No globally recognized international treaty on global cyber-security or internet governance Budapest Convention on Cybercrime (2001), Council of Europe Non-European countries participate (including U.S.A.) Russian concerns on Art. 32 (B) Proposals of the Russian Federation on the Concept of the U.N. Convention of the International Information Security (2010-2012) Council of Europe Governing Principles (2011) as possible common platform for interaction

Highly politicized issue (broader understanding of cyber-security, including freedom of speech, cyber-extremism etc.) Dubai World Conference on Telecommunications (2012): only 89 of 152 countries signed the new version of the International Telecommunication Regulation Internet is a multi-layer network, substantially with different level of regulatory framework: physical lines, communications channels, core DNS servers, IP-addresses, DNS, applications etc. No technological grounds for ITU vs ICANN conflict

Exists in reality Sometimes the negative consequences may be caused not by software tools (Armenian case 2010) Known cases not confirmed (globally recognized): attribution issue (Estonian case 2007) Cyber Commands being created throughout the world Non-proliferation of cyber-warfare needed (if possible?)

1. Whether what Snowden revealed (=NSA surveillance), is a bug or the feature of the current Internet Governance System? +how it affects the state of the global cyber-security? 2. If the bug -> than it has nothing to see with the real regulatory system of the current Internet, and it should be solved on domestic (violation of privacy laws) and international (diplomatic level) 3. If the feature -> new framework of Internet Governance should be developed to guarantee the stability and security of the cyberspace

Identification of the Internet users and network resources owners Attribution of the illegal acts in the cyberspace US concepts on Trusted Identities (=> may be discussed globally) Electronic payments Anti-money laundering, combating cybercrime and cyberterrorism Social networks regulation Population of Facebook citizens is the third country of the world, after China and India (>1 b users)

1. International Treaty on Cyber Security (and/or Internet Governance) may be our common objective by 2015-2016 Unified terminology Governing principles identity, e-payments, social networks, privacy 2. Non-proliferation of Cyber-Warfare is now in the international political agenda 3. Multistakeholders approach should be a basis for any solution in the field of global cyber-security

Thank you for your attention! e-mail: m.yakushev@gmail.com http: www.pircenter.org/en/