Unpacking Cyber-Capacity Building in Shaping Cyberspace Governance: - - PowerPoint PPT Presentation

unpacking cyber capacity building in shaping cyberspace
SMART_READER_LITE
LIVE PREVIEW

Unpacking Cyber-Capacity Building in Shaping Cyberspace Governance: - - PowerPoint PPT Presentation

Unpacking Cyber-Capacity Building in Shaping Cyberspace Governance: the SADC case Enrico Calandro & Nils Berglund GIGAnet, IGF Berlin 2019, 25 Nov 2019 1 ? Can global consensus be reached on the governance of cyberspace? Cyberspace


slide-1
SLIDE 1

1

Unpacking Cyber-Capacity Building in Shaping Cyberspace Governance: the SADC case

Enrico Calandro & Nils Berglund

GIGAnet, IGF Berlin 2019, 25 Nov 2019

slide-2
SLIDE 2

?

slide-3
SLIDE 3

3

Can global consensus be reached on the governance of cyberspace?

  • Cyberspace as a new domain of global security affairs
  • Budapest Convention: fostering international co-operation
  • UN Group of Governmental Experts (UN GGE) on Developments in the Field
  • f Information and Telecommunications in the Context of International

Security; Open-Ended Working Group (OEWG)

  • US International Cybersecurity Strategy the “development of an

international consensus on and promotion of additional voluntary norms

  • f responsible state behavior in cyberspace that apply during peacetime”
  • Microsoft ‘Digital Geneva Convention’ support for the Paris Call
  • Siemens Charter of Trust
slide-4
SLIDE 4

4

International, regional and sub-regional priority

Building towards consensus

  • ITU/EC: SADC Model Law on Cybercrime
  • harmonising cybersecurity legislation
  • BRICS approach to securing cyberspace: “We will

explore cooperation on combating cybercrimes and we also recommit to the negotiation of a universal legally binding instrument in that field”

  • AU Convention on Cyber Security and Personal Data

Protection (2014 Malabo Convention)/UNECA: unifying the continent under the same rules and priorities

slide-5
SLIDE 5

particularities of the approaches to, and priorities of cybersecurity policy and strategy can considerably diverge, both nationally and regionally, and between the public, the private, and CSO sectors.

…an effectively global consensus has proved elusive

slide-6
SLIDE 6

6

Disagreements on the governance

  • f cyberspace
  • 1998, Russian Federation General Assembly resolution
  • n information security (A/53/PV.79, 1998).
  • Russian approach to cybersecurity largely shared by the

broader Shanghai Cooperation Organization and several

  • ther countries, continues to differ from that of the

European Union and its like-minded allies

  • state control,
  • the role of the ITU, and
  • human rights in cyberspace (Nocetti, 2015)
slide-7
SLIDE 7

7

Disagreements on the governance

  • f cyberspace
  • 2012 World Conference on International

Telecommunications (WCIT)

  • contentious debate on whether to expand the mandate of the ITU

to Internet governance functions, thus expanding government influence over the Internet. Clear division between

  • EU, OECD and Freedom Online Coalition members against the treaty, and

comparatively less democratic(*) states voting in favour

  • African nations with more capacity and regional influence, including Botswana and

South Africa in SADC, have been characterised as ‘swing states’ (Maurer & Morgus, 2014) in global cyber policy controversies.

(*) “Less democratic” in this case is based on the metrics of the ‘Freedom in the World Index’ (Freedom House, 2018) and the Democracy Index of the Economist Intelligence Unit (The Economist, 2018).

slide-8
SLIDE 8

8

Disagreements on the governance

  • f cyberspace
  • Cyber disarmament
  • Non-binding, voluntary approach to responsible state

behaviour vs treaty

  • ‘information/data sovereignty’
slide-9
SLIDE 9

9

Capacity building projects

  • in addition to development goals, they promote

international collaboration, information sharing and serve as mechanisms to build a global consensus on the issue of cybersecurity.

  • through norms, best-practices, technical standards, or rules and

priorities

  • in the context of cybersecurity: ‘capacity’ is a broader term

that can be understood as a state’s ability to effectively manage the functions necessary for securing cyberspace

  • UN GGE report 2015 ““provide assistance and training to

developing countries to improve security in the use of ICTs”

slide-10
SLIDE 10

Cyber Capacity Building

“Foreign policy tool used to advance national interests (ideological, security, economic, etc.) and norms” (Pawlak, 2016)

extend beyond the efforts of nations, donors or multilateral

  • rganisations to include the priorities of the private sector
slide-11
SLIDE 11
  • 1. Why are regional cyber policies, protocols and declarations not always implemented at

a national level?

  • 2. What is the state of cybersecurity legislation and policy in SADC?
  • 3. What are the drivers (national and international) of the development of cyber-policy

and regulatory frameworks at a regional and sub-regional level in Africa?

why have cyber capacity building processes failed to achieve the level of harmonisation evoked in protocols and declarations in Africa?

slide-12
SLIDE 12

12

Research Methodology and Data Sources

  • Primary data
  • semi-structured interviews
  • Secondary Data
  • Mapping of the main cyber capacity activities undertaken

at SADC level (Desk review)

  • Cross-reference
  • Cybil
  • UNIDR Cyber Policy Portal
  • UNCTAD Global Cyberlaw Tracker
slide-13
SLIDE 13

Cyber capacity processes in SADC

Cybersecurity Maturity Models Cyber Capacity Training Private sector involvement Cybersecurity awareness (public education or training programs) Regional and multilateral agreements Cyber policy and strategy Cybersecurity legislation Institutional arrangements Incident response

Cyber Capacity Building CCB Outputs

slide-14
SLIDE 14

14

Uneven levels of ICT development - differences in terms of how cybersecurity is prioritised

slide-15
SLIDE 15

Internet use vs GNI PP vs GCI ITU

0,407 0,565 0,652 0,401 0,603 0,251 0,719 0,65 0,407 0,437 0,525 0,161 0,748 0,642 0,697 0,158 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Argentina Colombia South Africa Peru Paraguay Guatemala India Nigeria Pakistan Ghana Bangladesh Cambodia Kenya Tanzania Rwanda Mozambique

GNI per capita Internet use GCI ITU

slide-16
SLIDE 16

Several competing agendas, with resulting competing priorities - Norms, standards, and best practices that are encouraged through capacity building initiatives are oft not built on regionally held or national priorities – Epistemic communities

slide-17
SLIDE 17
  • Multilateral Organisation
  • GLACY + CoE
  • ITU
  • UNODC
  • EU/NI-CO
  • CTO
  • National agencies
  • JICA
  • US Department of States
  • NUPI
  • Singapore (Interpol)
  • UK
  • Estonia
  • Private Sector
  • Nortal
  • Google
  • Facebook
  • GSMA
  • HUWAWEI
  • Microsoft
  • GSMA
  • Estonia
slide-18
SLIDE 18

Uneven outputs in terms of NCS, cyber policy, legislation, and institutional arrangements

slide-19
SLIDE 19

SADC COUNTRIES CMM ASSESSMENT POLICY / STRATEGY LEGAL FRAMEWORK CSERT / CIRT INSTITUTIONAL ARRANGEMENT

ANGOLA BOTSWANA COMOROS

None

DRC CONGO

None

ESWATINI

None

LESOTHO

None

MADAGASCAR MALAWI MAURITIUS MOZAMBIQUE

MoRENET (academia)

NAMIBIA

ICT Strategic Plan 2017-2022 (mentions cybercrime)

SEYCHELLES SOUTH AFRICA TANZANIA ZAMBIA ZIMBABWE

National Policy for ICT from 2016 (Recognised by ITU as an NCS None

slide-20
SLIDE 20

4th Industrial Revolution and the private sector priorities

slide-21
SLIDE 21

5G IoT AI Cloud

slide-22
SLIDE 22

Human rights concerns in relation to cybercrime legislation

slide-23
SLIDE 23

23

Conclusions & Policy recommendations

  • Technical and normative approach to institutions, processes and

rules in this area, outside a human rights and good governance framework, may have the unintended outcome of effectively weakening the protection of individual rights

  • Identify national priorities in terms of cyber capacity
  • Development theory based on a commitment to freedom,

equity and cooperative interdependence

  • holding States accountable to their commitment to the Universal

Declaration of Human Rights

  • rights-based approach should be at the core of a safe Internet
  • Improve the coordination of cyber capacity objectives and

activities, to reduce fragmentation and improve impact

slide-24
SLIDE 24

24

  • Reflect on SADC ability to enforce new binding treaties on the

governance of cyberspace currently under discussion at a UN level.

  • Capacity building is needed indeed to observe the non-binding, and

voluntary norms, principles and rules on responsive state behaviour in cyberspace agreed upon with resolution (A/70/174, 2015), and to clarify how international laws apply in cyberspace.

  • Therefore, policies should aim at improving coordination efforts

between all stakeholders dealing with cyber capacity building, to allow existing UN resolutions to be effectively implemented.

  • Nationally, cyber maturity assessments can support the

identification of specific points of policy intervention

Conclusions & Policy recommendations

slide-25
SLIDE 25

25

Thank you

Research made possible by