[2024]Digital Global Overview Report 2024 Meltwater.pdf
INTERNATIONAL SECURITY MEASURES IN CYBERSPACE
1. INTERNATIONAL SECURITY MEASURES
IN CYBERSPACE
Indonesia Information Security Forum
10.10.2012, Bandung, Indonesia
Prof. Dr. Marco Gercke
Cybercrime Page: 1
2. WHAT ARE CYBER SECURITY MEASURES
BRINGING CYBER SECURITY AND CYBERCRIME INTO CONTEXT
Cybercrime Page: 2
3. CYBERCRIME / CYBERSECURITY
• Cybersecurity is broader than just Components of Cybersecurity
Cybercrime Strategy (based on ITU GCA)
• If a government employee accidentally
drops an external storage device with
important data that were not included in
backup-plans it is a serious
Cybersecurity incident – but not a crime
• Based on the ITU Global Cybersecurity
Agenda (GCA) it is possible to divide
between 5 different pillars related to
Cybersecurity (legal measures, technical
Measures
Legal
Measures
Techn. / Proced.
Structures
Organizational
Building
Capacity
Cooperation
International
and procedural measures, organizational
structures, capacity building and
international cooperation
Cybercrime Page: 3
4. CYBERCRIME / CYBERSECURITY
• Within all pillars Cybercrime needs to be Components of Cybersecurity
addressed Strategy (based on ITU GCA)
• In some pillars (such as international
cooperation) Cybercrime may even be the
dominant part (international cooperation
in Cybercrime investigations)
• The same is relevant with regard to legal
measures. Cybercrime legislation is in
many country the most complex part of a
Cybersecurity legal framework
Measures
Legal
Measures
Techn. / Proced.
Structures
Organizational
Building
Capacity
Cooperation
International
• But it is important to always keep in mind
that in each pillar other issues will need
to be addressed.
Cybercrime Page: 4
5. CYBERCRIME / CYBERSECURITY
• And it is important to see that some Components of Cybersecurity
components are not solely related to Strategy (based on ITU GCA)
Cybercrime
• Example: CERT
• Preventing Cybercrime, analysing trends
related to Cybercrime, development of
tools in the fight against Cybercrime,
capacity building and support of law
CERT
enforcement agencies in fighting
Cybercrime can be important tasks for a
cert
Measures
Legal
Measures
Techn. / Proced.
Structures
Organizational
Building
Capacity
Cooperation
International
• But not all work of a CERT will be related
to Cybercrime
Cybercrime Page: 5
7. TCP/IP
• The Internet uses globally applicable
technical standards
• Whoever does not apply the global
standards is in most cases excluded
from using the network
Picture removed in print version
Bild zur Druckoptimierung entfernt
• With regard to Cybersecurity there is a IOL News 2011
lack in applying global standards
Cybercrime Page: 7
9. 198oth
• Increasing use of personal computers
• Lead to an increase in the potential
number of targets
• First cases of software piracy
• In addition malicious software was more
frequently produced and distributed
Picture removed in print version
Bild zur Druckoptimierung entfernt
Source: Wikipedia with ref to B. Bertram
Cybercrime page: 9
10. 198oth - HISTORY OF VIRUSES
• 1982 the “Elk Cloner” virus was created
(by Rich Skrenta). Designed for Apple OS
• 1986 “Brain Virus” was identified. Virus
was designed for MS-DOS
Picture removed in print version
Bild zur Druckoptimierung entfernt
Example
• 1986 the the file virus “Virdem” followed
• 1990 the first polymorph virus attack
“Tequila” was started
Cybercrime Seite: 10
11. 198oth- MATH VIRUS
• „Math virus“ stopped the computer after
30 steps and displays a simple addition
or subtraction questions
• Execution of the program is denied
unless the correct answer is given by the
user
Picture removed in print version
Bild zur Druckoptimierung entfernt
Math Virus
Cybercrime Seite: 11
12. 198oth – WALKER VIRUS
• Relatively harmless virus
• Walker virus: Displays occasionally an
animation
Picture removed in print version
Bild zur Druckoptimierung entfernt
Walker Virus
Cybercrime Seite: 12
13. 199oth
• Introduction of the graphical user
interface WWW (World Wide Web) in
the 1990th lead to an increasing
popularity of the network
• It became easier to use the services
offered
• In addition it enabled the spreading of
Picture removed in print version
pictures, audio and video Bild zur Druckoptimierung entfernt
Source: Wikipedia with ref. to Cailliau
• In addition the Internet eased
transnational communication
• Went along with several challenges for
law enforcement
Cybercrime page: 13
14. 1990th - VIRUS
• While in the 1980th the speed of the
distribution was limited due to the
distribution by physical data storage
media exchange it was less limited with
the intensive use of the Internet
Picture removed in print version
Bild zur Druckoptimierung entfernt
Example
Cybercrime Seite: 14
15. ACTIVITIES OF REG. AND INT. ORGANIZATIONS
RELATED TO CYBERCRIME
Cybercrime page: 15
16. COMMONWEALTH OF NATIONS
• The Commonwealth of Nations is a
voluntary association of sovereign
states
• Currently 53 associated states
• In 2002 the Commonwealth presented Picture removed in print version
Bild zur Druckoptimierung entfernt
a model law on Cybercrime that COMMONWEALTH MEMBER STATES
provides a legal framework to address
Cybercrime
• The model law was intentionally
drafted in accordance with the
Convention on Cybercrime
Gercke, Cybercrime Page: 16
17. ECONOMIC COMMUNITY OF WEST AFR.
• The Economic Community of West
African States is a regional group of
west African Countries
• Founded in 1975 it has currently fifteen
member states
Picture removed in print version
Bild zur Druckoptimierung entfernt
• In 2009 ECOWAS adopted the Directive ECOWAS MEMBER STATES
on Fighting Cybercrime in ECOWAS
that provides a legal framework for the
member states
• Directive includes substantive criminal
law as well as procedural law
Gercke, Cybercrime Page: 17
18. EAST AFRICAN COMMUNITY
• 5 Member states (Kenya, Uganda,
Tanzania, Burundi, Rwanda)
• Within the framework of an update of
ICT legislation (EAC Legal Framework
for Cyberlaws) EAS also addressed the
issues of Cybercrime Picture removed in print version
Bild zur Druckoptimierung entfernt
EAC MEMBER STATES
• Provisions dealing with the
criminalisation of certain conduct
became part of the draft legislation
Gercke, Cybercrime Page: 18
19. EUROPEAN UNION
• The European Union is a political Union
of 27 member states
• One of the mandate of the EU is to
harmonise legislation in selected areas
• It has adopted several Framework
Decision and Directives to harmonise
Picture removed in print version
the legislation with regard to Cybercrime Bild zur Druckoptimierung entfernt
• The 27 member states are obliged to EUROPEAN UNION
implement the legislation within the
given time period
Gercke, Cybercrime Page: 19
20. EUROPEAN COMMUNITY / UNION
FD Attacks Information Systems
FD Child Pornography Dir. Data Retention
FD Combating Fraud Amendment FD Terrorism
Counc. D. Child Pornography Draft Directive Child Pornography
Draft Directive Attacks Information Systems
97 98 99 00 01 02 03 04 05 06 07 08 09 10 10 11
Safer Information Society General Policy Cybercrime
eEurope Action Plan
Action plan harmful content
Communication harmful content
Cybercrime Page: 20
21. COUNCIL OF EUROPE
• Council of Europe is an international
organisation focusing on the European
integration
• 47 member states
• Convention on Cybercrime (2001) Picture removed in print version
Bild zur Druckoptimierung entfernt
COUNCIL OF EUROPE
• First addition protocol to the
Convention on Cybercrime (2003)
• Convention on the protection of
children against sexual exploitation
and sexual abuse (2007)
Gercke, Cybercrime Page: 21
22. UNITED NATIONS
• United Nations Organisation is an
international organisation (192 member
states)
• In 1990 the UN GA adopted a resolution
dealing with computer crime legislation
• In 2000 the UN GA adopted a resolution
Picture removed in print version
on combating the criminal misuse of Bild zur Druckoptimierung entfernt
information technology UNITED NATIONS ORGANISATION
• In 2002 the UN GA adopted a second
resolution on the criminal misuse of
information technology
Gercke, Cybercrime Page: 22
23. Cybercrime
Law
Criminal
EU DI Child Pornography (2011)
EU FD Child Pornography (2003)
EU FD Non-Cash Payment (2001)
Commonwealth Model Law (2002)
CoE Cybercrime Convention (2001)
Substantive
Draft African Union Convention (2011)
HIPCAR Cybercrime Model Law (2010)
EU Draft DI Attacks Information S. (2011)
CoE Convention Protection Children (2007)
EU FD Attacks Information Systems (2005)
Illegal Access to a Computer
✔
✔
✔
✔
Illegal Remaining in a Computer
System Interference
✔
Illegal Interception
✔ ✔ ✔ ✔
✔ ✔
✔ ✔ ✔ ✔
✔ ✔
✔ ✔
Illegal Access to Computer Data
Illegal Data Input
✔
Illegal Aquisition of Comp. Data
Illegal Data Interference
✔ ✔
✔
✔
✔
✔
Illegal Use of Data
Violation of Data Protection Regul.
Illegal Devices / Misuse of Devices
✔
✔
Computer-related Fraud
✔ ✔
Computer-related Forgery
✔ ✔ ✔
✔ ✔ ✔ ✔ ✔ ✔
✔ ✔ ✔
Indecent Material
Pornography
Child Pornography
✔
✔ ✔
✔
✔
Solicitation of Children
✔
✔ ✔
✔ ✔
Dissemination of Racistic Material
✔
Identity-related Crime
SPAM
Threat and Harassment
✔ ✔ ✔
Disclosure of an Investigation
✔
Copyright Violation
✔
Violation of Secrecy
✔
page: 23
30. COMPONENTS
Substantive Criminal Law
Procedural Law
International Cooperation
Convention on Cybercrime
Cybercrime Page: 30
31. National Cybersecurity
Strategy
Cybercrime
Cybercrime Technology,
Policy CERT, .... COMPONENTS
Criminal Crime Prevention,
Law Technology
Liability of ISPs
Procedural Law
Electronic Evidence
Substantive Criminal Law
International Cooperation
Trained
Investigators
Equiptment
Training
Page: 31
32. Prof. Dr. Marco Gercke
Niehler Str. 35
D-50733 Cologne, Germany
gercke@cybercrime.de
www.cybercrime-institute.com
Cybercrime Page: 32