Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

25
1 Unpacking Cyber-Capacity Building in Shaping Cyberspace Governance: the SADC case Enrico Calandro & Nils Berglund GIGAnet, IGF Berlin 2019, 25 Nov 2019

Transcript of Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

Page 1: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

1

Unpacking Cyber-Capacity Building in Shaping Cyberspace Governance: the SADC caseEnrico Calandro & Nils Berglund

GIGAnet, IGF Berlin 2019, 25 Nov 2019

Page 2: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

?

Page 3: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

3

Can global consensus be reached on the governance of cyberspace?‣ Cyberspace as a new domain of global security affairs

• Budapest Convention: fostering international co-operation

• UN Group of Governmental Experts (UN GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security; Open-Ended Working Group (OEWG)

• US International Cybersecurity Strategy the “development of an international consensus on and promotion of additional voluntary norms of responsible state behavior in cyberspace that apply during peacetime”

• Microsoft ‘Digital Geneva Convention’ support for the Paris Call

• Siemens Charter of Trust

Page 4: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

4

International, regional and sub-regional priorityBuilding towards consensus

‣ ITU/EC: SADC Model Law on Cybercrime

• harmonising cybersecurity legislation

‣ BRICS approach to securing cyberspace: “We will explore cooperation on combating cybercrimes and we also recommit to the negotiation of a universal legally binding instrument in that field”

‣ AU Convention on Cyber Security and Personal Data Protection (2014 Malabo Convention)/UNECA: unifying the continent under the same rules and priorities

Page 5: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

particularities of the approaches to, and priorities of cybersecurity policy and strategy can considerably diverge, both nationally and regionally, and between the public, the private, and CSO sectors.

…an effectively global consensus has proved elusive

Page 6: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

6

Disagreements on the governance of cyberspace

‣ 1998, Russian Federation General Assembly resolution on information security (A/53/PV.79, 1998).

• Russian approach to cybersecurity largely shared by the broader Shanghai Cooperation Organization and several other countries, continues to differ from that of the European Union and its like-minded allies

- state control,

- the role of the ITU, and

- human rights in cyberspace (Nocetti, 2015)

Page 7: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

7

Disagreements on the governance of cyberspace

‣ 2012 World Conference on International Telecommunications (WCIT)

• contentious debate on whether to expand the mandate of the ITU to Internet governance functions, thus expanding government influence over the Internet. Clear division between

- EU, OECD and Freedom Online Coalition members against the treaty, and comparatively less democratic(*) states voting in favour

- African nations with more capacity and regional influence, including Botswana and South Africa in SADC, have been characterised as ‘swing states’ (Maurer & Morgus, 2014) in global cyber policy controversies.

(*) “Less democratic” in this case is based on the metrics of the ‘Freedom in the World Index’ (Freedom House, 2018) and the Democracy Index of the Economist Intelligence Unit (The Economist, 2018).

Page 8: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

8

Disagreements on the governance of cyberspace

‣ Cyber disarmament

• Non-binding, voluntary approach to responsible state behaviour vs treaty

‣ ‘information/data sovereignty’

Page 9: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

9

Capacity building projects

‣ in addition to development goals, they promote international collaboration, information sharing and serve as mechanisms to build a global consensus on the issue of cybersecurity.

• through norms, best-practices, technical standards, or rules and priorities

‣ in the context of cybersecurity: ‘capacity’ is a broader term that can be understood as a state’s ability to effectively manage the functions necessary for securing cyberspace

‣ UN GGE report 2015 ““provide assistance and training to developing countries to improve security in the use of ICTs”

Page 10: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

Cyber Capacity Building

“Foreign policy tool used to advance national interests (ideological, security, economic, etc.) and norms” (Pawlak, 2016)

extend beyond the efforts of nations, donors or multilateral organisations to include the priorities of the private sector

Page 11: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

1. Why are regional cyber policies, protocols and declarations not always implemented at a national level?

2. What is the state of cybersecurity legislation and policy in SADC?

3. What are the drivers (national and international) of the development of cyber-policy and regulatory frameworks at a regional and sub-regional level in Africa?

why have cyber capacity building processes failed to achieve the level of harmonisation evoked in protocols and declarations in Africa?

Page 12: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

12

Research Methodology and Data Sources‣ Primary data

• semi-structured interviews

‣ Secondary Data

• Mapping of the main cyber capacity activities undertaken at SADC level (Desk review)

‣ Cross-reference

• Cybil

• UNIDR Cyber Policy Portal

• UNCTAD Global Cyberlaw Tracker

Page 13: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

Cyber capacity processes in SADC

Cybersecurity Maturity Models

Cyber Capacity Training

Private sector involvement

Cybersecurity awareness (public education or training programs)

Regional and multilateral agreements

Cyber policy and strategy

Cybersecurity legislation

Institutional arrangements

Incident response

Cyber Capacity Building

CCB Outputs

Page 14: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

14

Uneven levels of ICT development -differences in terms of how cybersecurity is prioritised

Page 15: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

Internet use vs GNI PP vs GCI ITU

0,407

0,565

0,652

0,401

0,603

0,251

0,719

0,65

0,4070,437

0,525

0,161

0,748

0,642

0,697

0,158

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Argentina

Colombia

South Africa

Peru

Paraguay

GuatemalaIndia

Nigeria

PakistanGhana

Bangladesh

CambodiaKenya

Tanzania

Rwanda

Mozambique

GNI per capita Internet use GCI ITU

Page 16: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

Several competing agendas, with resulting competing priorities -Norms, standards, and best practices that are encouraged through capacity building initiatives are oft not built on regionally held or national priorities – Epistemic communities

Page 17: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

‣ Multilateral Organisation

• GLACY + CoE

• ITU

• UNODC

• EU/NI-CO

• CTO

‣ National agencies

• JICA

• US Department of States

• NUPI

• Singapore (Interpol)

• UK

• Estonia

‣ Private Sector

• Nortal

• Google

• Facebook

• GSMA

• HUWAWEI

• Microsoft

• GSMA

• Estonia

Page 18: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

Uneven outputs in terms of NCS, cyber policy, legislation, and institutional arrangements

Page 19: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

SADC COUNTRIES

CMM ASSESSMENT POLICY / STRATEGY LEGAL FRAMEWORK CSERT / CIRT INSTITUTIONAL

ARRANGEMENT

ANGOLA

BOTSWANA

COMOROS None

DRC CONGO None

ESWATINI None

LESOTHO None

MADAGASCAR

MALAWI

MAURITIUS

MOZAMBIQUE MoRENET (academia)

NAMIBIA ICT Strategic Plan 2017-2022 (mentions cybercrime)

SEYCHELLES

SOUTH AFRICA

TANZANIA

ZAMBIA

ZIMBABWE National Policy for ICT from 2016 (Recognised by ITU as an NCS None

Page 20: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

4th Industrial Revolution and the private sector priorities

Page 21: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

5GIoT

AI

Cloud

Page 22: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

Human rights concerns in relation to cybercrime legislation

Page 23: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

23

Conclusions & Policy recommendations‣ Technical and normative approach to institutions, processes and

rules in this area, outside a human rights and good governance framework, may have the unintended outcome of effectively weakening the protection of individual rights

‣ Identify national priorities in terms of cyber capacity

‣ Development theory based on a commitment to freedom, equity and cooperative interdependence

• holding States accountable to their commitment to the Universal Declaration of Human Rights

• rights-based approach should be at the core of a safe Internet

‣ Improve the coordination of cyber capacity objectives and activities, to reduce fragmentation and improve impact

Page 24: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

24

‣ Reflect on SADC ability to enforce new binding treaties on the governance of cyberspace currently under discussion at a UN level.

‣ Capacity building is needed indeed to observe the non-binding, and voluntary norms, principles and rules on responsive state behaviour in cyberspace agreed upon with resolution (A/70/174, 2015), and to clarify how international laws apply in cyberspace.

‣ Therefore, policies should aim at improving coordination efforts between all stakeholders dealing with cyber capacity building, to allow existing UN resolutions to be effectively implemented.

‣ Nationally, cyber maturity assessments can support the identification of specific points of policy intervention

Conclusions & Policy recommendations

Page 25: Unpacking Cyber-Capacity Building in Shaping Cyberspace ...

25

Thank youResearch made possible by