Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ensuring Cyberpeace in a New World Order Dr. Hamadoun Touré Secretary General International Telecommunications Union, Geneva.

Similar presentations


Presentation on theme: "Ensuring Cyberpeace in a New World Order Dr. Hamadoun Touré Secretary General International Telecommunications Union, Geneva."— Presentation transcript:

1 Ensuring Cyberpeace in a New World Order Dr. Hamadoun Touré Secretary General International Telecommunications Union, Geneva

2 A new domain: Cyberspace, security & warfare Digital communications, networks and systems provide vital resources and indispensable infrastructure Digital communications, networks and systems provide vital resources and indispensable infrastructure Cyberspace – both the physical and conceptual realm in which ICTs operate Cyberspace – both the physical and conceptual realm in which ICTs operate Security – critically important as global reliance on ICTs grows Security – critically important as global reliance on ICTs grows Recent attacks against computer systems in Georgia, Estonia, South Korea and the United States have been linked with cyber warfare Recent attacks against computer systems in Georgia, Estonia, South Korea and the United States have been linked with cyber warfare

3 Cyberwar Cyberwar – targeting military capabilities and systems, as well as all the vital infrastructure of a society that allows it to function and defend itself. Cyberwar – targeting military capabilities and systems, as well as all the vital infrastructure of a society that allows it to function and defend itself. Tactics involve data collection or infiltration of computerized systems to cause damage to critical systems. Tactics involve data collection or infiltration of computerized systems to cause damage to critical systems. Other/new targets and threats include: Other/new targets and threats include:   SCADA   Smart Grids   Nuclear weapons control facilities   Power generators (and other costly replacement parts)   Financial systems

4 Cyberwar – Features & Impact Anonymous and asymmetric in nature Anonymous and asymmetric in nature An ICT-based attack would cause failure beyond a single system and often beyond national boundaries An ICT-based attack would cause failure beyond a single system and often beyond national boundaries Cyber offenders need not be present at the origin nor the destination of the attack Cyber offenders need not be present at the origin nor the destination of the attack Use of software tools to automate attacks Use of software tools to automate attacks One IT system can attack thousands of others in a single day One IT system can attack thousands of others in a single day Deterrence and retaliation are difficult due to attribution and collateral damage problems Deterrence and retaliation are difficult due to attribution and collateral damage problems

5 National Policies & Approaches to Cyberwar – Incorporating cyber capabilities into conventional warfare strategy – building up cyber offensive weapons and defensive capabilities. Increasing funding, research and tactical and diplomatic resources to improve cyber security. Cultivating cyber tactics as a national resource or strategic asset. Building cyber military outfits. Using cyber tactics to level the playing field. Educating citizens and raising awareness of cybersecurity problems. Less connected and developing countries also have a stake in the future of cybersecurity.

6 International Responses to Cyberwar United Nations Office of Drugs and Crime (UNODC)- United Congress on Crime Prevention and Criminal Justice) United Nations Economic and Social Council (ECOSOC) North Atlantic Treaty Organization (NATO) Council of Europe- Budapest Convention on Cybercrime Bilateral agreements between countries International Telecommunication Union (ITU-T SG 17) Focus group on Smart Grid

7 Necessity of an international framework Non-viability of deterrence The fundamental characteristics of cyberspace undermine the efficacy of deterrence as an approach to cyberpeace” “The fundamental characteristics of cyberspace undermine the efficacy of deterrence as an approach to cyberpeace” To harmonize national legal frameworks to combat cybercrime: “An international framework committing countries to the protection of cyberspace and providing for information sharing, warning systems, coordinated responses and post-incident restoration will best accomplish these goals” “An international framework committing countries to the protection of cyberspace and providing for information sharing, warning systems, coordinated responses and post-incident restoration will best accomplish these goals”

8 Proposals for International Cyberpeace 1. Every government should commit itself to giving its people access to communications 2. Every government will commit itself to protecting its people in cyberspace 3. Every country will commit itself not to harbor terrorists/criminals in its own territories 4. Every country should commit itself not to be the first to launch a cyber attack on other countries 5. Every country must commit itself to collaborate with each other within an international framework of cooperation to ensure that there is peace in cyberspace 5 Principles

9 ITU and Cybersecurity 2003 World Leaders at the World Summit on the Information Society (WSIS) entrusted ITU as sole facilitator for WSIS Action Line C5 - “Building Confidence and Security in the use of ICTs.” Since 2006 ITU Plenipotentiary Conference, ITU has set cybersecurity as one of its top three priorities. On 17 May 2007, in response to the decision of the ITU Membership and in fulfillment of ITU’s role as sole facilitator for WSIS Action Line C5, ITU Secretary-General launched the Global Cybersecurity Agenda (GCA) – a framework for international cooperation in cybersecurity. ITU is also promoting cybersecurity through a range of activities related to standardization and technical assistance to developing countries tailored to their specific needs.

10 GCA is designed for cooperation and efficiency, encouraging collaboration with and between all relevant partners, and building on existing initiatives to avoid duplicating efforts. GCA builds upon five pillars: Legal Measures Technical and Procedural Measures Organizational Structures Capacity Building International Cooperation H.E. Blaise Compaoré, President of Burkina Faso, and H.E. Dr Óscar Arias Sánchez, Former President of the Republic of Costa Rica and Nobel Peace Laureate, are both Patrons of the GCA. Global Cybersecurity Agenda (GCA)

11 GCA: From Strategy to Action ITU Standardization Work ICT Security Standards Roadmap ITU-R Security Activities ITU-T Study Group 17 ITU-T Study Group 2 ITU Standardization Work ICT Security Standards Roadmap ITU-R Security Activities ITU-T Study Group 17 ITU-T Study Group 2 2. Technical and Procedural Measures ITU High-Level Expert Group (HLEG) ITU-IMPACT Collaboration ITU Cybersecurity Gateway ITU’s Child Online Protection (COP) Collaboration with UNICEF, UNODC, UNICRI, UNICITRAL and UNIDIR ITU High-Level Expert Group (HLEG) ITU-IMPACT Collaboration ITU Cybersecurity Gateway ITU’s Child Online Protection (COP) Collaboration with UNICEF, UNODC, UNICRI, UNICITRAL and UNIDIR 5. International Cooperation 1. Legal Measures ITU Toolkit for Cybercrime Legislation ITU Publication on Understanding Cybercrime: A Guide for Developing Countries ITU Toolkit for Cybercrime Legislation ITU Publication on Understanding Cybercrime: A Guide for Developing Countries ITU National Cybersecurity Guide ITU Cybercrime Resources ITU Botnet Mitigation Toolkit and pilot projects IMPACT Training and Skills Development Centre IMPACT Research Division ITU National Cybersecurity Guide ITU Cybercrime Resources ITU Botnet Mitigation Toolkit and pilot projects IMPACT Training and Skills Development Centre IMPACT Research Division 4. Capacity Building Global Cybersecurity Agenda (GCA) ITU-IMPACT Collaboration National CIRT establishment ITU-IMPACT Collaboration National CIRT establishment 3. Organizational Structures

12 Conclusion Curbing Cyberthreats Globally The threat of cyberwar now looms larger than ever. The threat of cyberwar now looms larger than ever. We must protect our cyberspace for the continued flourishing of infrastructure and new technologies, and to ensure lasting peace. We must protect our cyberspace for the continued flourishing of infrastructure and new technologies, and to ensure lasting peace. ITU takes very seriously its responsibility for WSIS Action Line C5 “Building confidence and security in the use of ICTs.” ITU takes very seriously its responsibility for WSIS Action Line C5 “Building confidence and security in the use of ICTs.” ITU’s GCA provides its 191 Member States and others with the expertise, facilities and resources to effectively address the world’s most serious cyber threats. ITU’s GCA provides its 191 Member States and others with the expertise, facilities and resources to effectively address the world’s most serious cyber threats.

13 Thank you for your attention


Download ppt "Ensuring Cyberpeace in a New World Order Dr. Hamadoun Touré Secretary General International Telecommunications Union, Geneva."

Similar presentations


Ads by Google