1 UNODC and CYBERCRIME December 2010. 2 Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.

Slides:



Advertisements
Similar presentations
Thematic Discussion on Human Rights & Resolution 1373 Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 7 October 2010.
Advertisements

Its a new digital world with new digital dangers….
Secretariat for Multidimensional Security
UNODC in Latin America and the Caribbean Videoconference UNODC – OAS Committee on Hemispheric Security 14 August 2008.
Philippine Cybercrime Efforts
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
UN Comprehensive Study on Cybercrime
UNODC & the Global Response to Cybercrime
EUFJE BRUSSELS CONFERENCE 19 Octobre 2010 Joint meeting EUFJE – public prosecutors,
Ministry of Interior of Montenegro,,The Fight against corruption and organized crime in Montenegro Ministry of Interior of Montenegro,,The Fight against.
Council of Europe Eastern Partnership Facility 16 May 2013, Brussels.
THE REGIONAL ANTICORRUPTION INITIATIVE (RAI) FRAMEWORK FOR REGIONAL COOPERATION AND SHARING BEST PRACTICES IN FIGHTING CORRUPTION IN SEE Pravets, May 21-22,
INTER- GOVERNMENTALISM AND INTERNET SECURITY DR IAN BROWN, OXFORD / OII.OX.AC.UK.
Fraud and Identity Theft: The United Nations Crime Commission Intergovernmental Expert Group on Fraud and the Criminal Misuse and Falsification of Identity.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
EU responses to hate crimes and support to the victims Linda Maria Ravo DG Justice – European Commission Unit C1.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Strategies to prevent and respond to violence against children who are in contact with the justice system APJJC Second Meeting “Towards child-friendly.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Model regulations on demand reduction in Europe Bylaw on drug demand reduction.
Bratislava October 2007 PAR - AC CoP Meeting Anti Corruption Regional Programme Regional Programme.
UNODC support in the field of migrant smuggling and human trafficking legislation Bali Process on People Smuggling, Trafficking in Persons and related.
1 11 Combatting Trafficking in Persons (CTiP) Regional Support Office – The Bali Process 27 September 2013.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
World summit on the information society 1 Pierre Gagné International Telecommunication Union March 2004 WSIS Follow-up Building the Information Society:
Cybersecurity Governance in Ethiopia
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
A National approach to Cyber security/CIIP: Raising awareness.
Inter-American Program for the Prevention of Violence and Crime October 2014.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
EU Funding opportunities : Rights, Equality and Citizenship Programme Justice Programme Jose Ortega European Commission DG Justice.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Durban, South Africa, 8 July 2013 Outcome of WTSA-12 on spam Xiaoya Yang, Head, WTSA Programmes Division ITU-TSB ITU Workshop on “Countering.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
9th International Conference “Keeping children and young people safe online” 1 Szymon Wójcik Nobody’s Children Foundation Warsaw, Poland.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Countering Terrorist Use of the Internet – a perspective from the United Nations (Lomonosov Moscow State University) 11 November 2010.
PROGRAMMING OF INTERNATIOAL ASSISTANCE Donor Sectoral Meeting Ministry of Justice 25 th September, 2007.
1 Stockholm Convention on Persistent Organic Pollutants Clearing-house Mechanism for Information on POPs. Role of Regional Centres.
Public health, innovation and intellectual property 1 |1 | The Global Strategy on Public Health, Innovation and Intellectual Property Technical Briefing.
Future needs for capacity building and recommendations to the OIE Dr Sarah Kahn Consultant to the OIE
Office of Special Projects Issues arising from the Second Review Conference on Safety and Security at Chemical Plants and Relationships with CWC stakeholders.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
A look into current and future trends in national policies for eHealth and Innovation in the WHO European Region Clayton Hamilton, eHealth and Innovation.
THE REGIONAL ANTI-CORRUPTION INITIATIVE (RAI) FRAMEWORK FOR REGIONAL COOPERATION AND SHARING BEST PRACTICES IN FIGHTING CORRUPTION IN SEE Budapest, March.
United Nations IMPROVING GLOBAL ROAD SAFETY Resolution adopted by the General Assembly 106th plenary meeting 19 April 2012.
Strengthening national capacities to prevent and combat cybercrime: UNODC Global Programme on Cybercrime Tania Banuelos Crime Prevention and Criminal Justice.
15 October, 2012 Belgrade Human Trafficking and Migrant Smuggling Section (HTMSS) Trafficking in Persons.
World summit on the information society 1 WSIS: Building the Information Society: a global challenge in the new Millennium Tim Kelly, Claudia Sarrocco.
The work of UNODC on violence against women
Johannesburg, South Africa
UNCTAD work on consumer protection issues
Cybersecurity in Belarus a general overview of support areas
REGIONAL PROGRAMME IN THE ARAB STATES TO COMBAT
8 Building Blocks of National Cyber Strategies
Forth International Forum
  The Second Consultative Meeting on Strengthening Partnerships with National Rapporteurs on Trafficking in Persons and Equivalent Mechanisms Wednesday.
Promoting Global Cybersecurity
Combatting Trafficking in Persons (CTiP)
Supported by ITU-BTRC Asia-Pacific Regulators’ Roundtable
1. Introduction to the Convention 2
Millennium Development Goals (MDGs)
UNODC and CYBERCRIME October 2009.
Presentation transcript:

1 UNODC and CYBERCRIME December 2010

2 Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety of the critical information infrastructure on which critical sectors depend and securing the networks and services which serve the day-to- day needs of users   Ranging from the security of mobile devices to security aspects of network controlled critical infrastructure.

3 Cybercrime   Refers to criminal activity where a computer or network is the source, tool, target, or place of crime.   Poses threats not only to the confidentiality, integrity, or availability of computer systems, but also to the security of critical infrastructure

4 Solutions   Solutions are as broad as the topic is diverse   Ranging from:   technical solutions   education of users   legal measures   capacity building   international cooperation

5 Legislation   Legislation plays an important role when prevention strategies fail   States will refer to means of criminal law to enable investigation of acts of cybercrime   Without adequate criminalization, law enforcement agencies will not be able to carry out investigations and identify those who put security at risk

6 Criminalization There is an ongoing debate on the scope of acts to be criminalized Diverse challenges to criminalization being faced by countries all over the world Need for harmonization of criminalization provisions to facilitate international cooperation

7 Developing Countries Challenges - not only relevant for developed countries but also developing countries In 2005 the numbers of Internet users in developing countries surpassed the number of users in developed countries

8 UNODC Mandates  UN Convention Against Transnational Organized Crime  Resolutions of the: General Assembly ECOSOC Crime Commission Crime Congress

9 1) Cybercrime as “Serious Crime”   The most common forms of computer- related crimes fall within the definition in UNTOC as they are: 1. Transnational in nature 2. Involve an organized criminal group 3. Committed with the aim of achieving material or financial benefit UNTOC

10 2) Links between Cybercrime and Organized Crime  Traditional organized criminal groups adopting internet-related activities  Clear links between the most common cybercrimes and organized crime  Examples: child pornography, identity- related crime committed online, denial-of- service attacks UNTOC

11 3) Transnational Dimension   Cybercrime very often has a transnational dimension: Due to: underlying network architecture and global availability of services ( provider / hosting provider)   Essential to promote effective international cooperation in real time UNTOC

12 Article 2 and Paedophilia  The interpretative note to article 2 of UNTOC indicates that the aim of obtaining a financial or other material benefit could be interpreted broadly to include crimes in which predominant motivation may be sexual gratification.  This would include; 1. Receipt or trade of materials by members of child grooming rings, 2. The trading of children by members of paedophile rings, or 3. Cost sharing among ring members.

13 UNTOC Article 29  Requires parties to develop specific training programmes for law enforcement personnel (including prosecutors and investigating magistrates)  Subparagraph (h) states that such programmes shall deal with: 1. Methods used in combating transnational organised crime through the use of computers, 2. Telecommunications networks, or 3. Other forms of modern technology.

14 (A/RES/64/211) - March 2010   UN GA adopted a resolution on the Creation of a Global Culture of Cybersecurity   Call for countries to: “13. Review and update legal authorities including those related to cybercrime, privacy, data protection, commercial law, digital signatures and encryption that may be outdated or obsolete as a result of the rapid uptake of and dependence upon new information and communications technologies, and use regional and international conventions, arrangements and precedents in these reviews.” GA Resolutions

15 (A/RES/64/179)   Mandate on strengthening the United Nations Crime Prevention and Criminal Justice Programme, in particular its technical cooperation capacity   The Assembly drew attention to emerging crime policy issues, including cybercrime, and invited UNODC to explore within its mandate ways and means of addressing those issues GA Resolutions

16 ECOSOC Resolutions   United Nations study on fraud and the criminal misuse and falsification of identity released in 2007 (res 2004/26)   Establishment of a consultative platform to examine related issues (res 2007/20) Group of experts to meet for 5 th time on 6-8 December 2010   Development of tools and research papers/manual (res 2009/22) Identity-related crime committed online

Crime Congress Recommended that UNODC should continue to cooperate with relevant organizations to provide technical assistance and capacity building; and The development of an action plan for capacity-building at the international level be also considered. Salvador Declaration

Crime Commission (CCPCJ)   CCPCJ requested to conduct comprehensive study: “ …consider convening an open-ended intergovernmental expert group prior to the twentieth session of the Commission. This expert group should conduct a comprehensive study of the problem of cybercrime and responses to it by member States, the international community and the private sector, including the exchange of information on national legislation, best practices, technical assistance and international cooperation, with a view to examining options to strengthen existing and to propose new national and international legal or other responses to cybercrime.”   Resolution will be adopted by the General Assembly (December 2010 session) on the recommendation of the Economic and Social Council   Date for the first meeting of this group set for 17 – 21 January 2011 E/CN.15/2010/20 – May 2010

19 Why UNODC?  Only global intergovernmental body working in crime prevention and criminal justice  Mandate to implement the UNTOC  Comparative advantages through specialized technical competence, operational capacity and long term expertise in crime prevention, criminal justice and the rule of law  Unique position through ability to promote international cooperation, specific focus on the developing world, role as an honest-broker with a multilateral platform and extensive network of field offices

20 UNODC Assistance   UNODC is able to explore, along with countries, the feasibility of providing assistance to address computer-related crime under the aegis of the United Nations and in partnership with other similarly-focused organizations

21 UNODC Objectives  Focus of efforts on the developing world  No attempt to duplicate or re-invent the wheel  Instead: UNODC will look to use/build on/adapt what currently exists, and involve experts and institutions which have already developed and delivered tools and/or training to combat cybercrime  Ensure partnerships with other stakeholders such as Interpol, Europol, CoE, ITU, EU, UN Member states, and, equally, members of the private sector (such as software companies, and Internet service providers - ISPs)

22 Proposed Program on Cybercrime Objective - to assist developing countries to combat cybercrime Proposed framework:   Legislative assistance: Assist Member States in legislative drafting and adoption of adequate legislation based on country-specific demands and applicable instruments;   Capacity building (longer-term and sustainable): Build operational and institutional capacity of law enforcement and judicial bodies in relation to investigation, prosecution, and adjudication of serious crimes, provide training, and improve international cooperation and exchange between law enforcement authorities, including mutual legal assistance;   International cooperation mechanisms;   Broad-based policy & strategy development including internet-based private sector companies and civil society.   A particular component to target the misuse of ICTs for child sexual abuse and exploitation in developing countries.   Mobilize and raise awareness of civil society.

23 For further information: United Nations Office on Drugs and Crime Vienna International Centre PO Box 500, A-1400 Vienna, Austria Tel: Fax: ed-crime/index.html THANK YOU