You are here: Home Knowledge Base Polity Cybercrime, Cybersecurity and the Future of the Internet Solutions Create an international treaty to promote global cooperation on the detection, investigation and prosecution of cybercrime.
Symposium 2010

Solution for Cybercrime, Cybersecurity and the Future of the Internet

The Challenge

In the past decade, advances in communications technologies and the “informatization” of society have converged as never before in human history. This has given rise to the industrialization of ...

In the past decade, advances in communications technologies and the “informatization” of society have converged as never before in human history. This has given rise to the industrialization of a type of crime where the commodity—personal information—moves far too quickly for conventional law enforcement methods to keep pace.

Create an international treaty to promote global cooperation on the detection, investigation and prosecution of cybercrime.

Cybercrime is a truly global criminal phenomenon and cannot be adequately dealt with by single jurisdiction approaches to policing. International consensus on the detection, investigation and prosecution process must be reached to enable a more harmonized approach to the increasing number and growing sophistication of cyber attacks. There needs to be an international treaty to harmonize the relevant domestic criminal law elements across countries and to provide national executives with the means necessary to tackle cybercrime beyond their national boundaries.

In 2010, the United Nations rejected a Russian proposal for a treaty on cybercrime, because it was unable to reconcile differences between developing countries and the most advanced capitalist countries, led by the EU, the US and Canada. As the threats continue to escalate, now is the time for international agreement on the principles of cyber peace.

As yet, there is no Geneva Convention for the internet. There have already been examples of alleged international cyber attacks, such as that on Estonia, and the UK’s security services have warned businesses of rampant cyber espionage originating in the Far East. The Stuxnet virus has proved that effective cyber weapons could target critical national infrastructure anywhere in the world. Everyone knows that, at some level, everybody is prying and spying on everybody else’s cyber presence.

International Telecommunications Union secretary general Hamadoun Toure has proposed an international cyber peace treaty whereby signatories would agree that their infrastructure would not be used for cyber attacks. The Council of Europe has proposed a global treaty to protect the internet and Nato is understood to be considering the prospects for such an agreement.

    Related Solutions

    Solution
    Symposium 2010

    Establish an efficient online self-reporting system for cybercrime victims to enable widespread gathering and analysis of cybercrime statistics.

    Establish an efficient online self-reporting system for cybercrime victims to enable widespread gathering and analysis of cybercrime statistics.

    Establish an efficient online self-reporting system for cybercrime victims to enable widespread gathering and analysis of cybercrime statistics.

    Polity, Academia, Business, Civil Society
    Solution
    Symposium 2010

    To tackle cybercrime effectively, establish multidimensional public-private collaborations between law enforcement agencies, the information technology industry, information security organizations, internet companies and financial institutions.

    To tackle cybercrime effectively, establish multidimensional public-private collaborations between law enforcement agencies, the information technology industry, information security organizations, in ...

    To tackle cybercrime effectively, establish multidimensional public-private collaborations between law enforcement agencies, the information technology industry, information security organizations, internet companies and financial institutions.

    Polity, Business
    Solution
    Symposium 2010

    Intensify research into cyber attackers’ psychological and developmental profiles, motives and behavior—and develop efficient identification and rehabilitation mechanisms based on the related research results.

    Intensify research into cyber attackers’ psychological and developmental profiles, motives and behavior—and develop efficient identification and rehabilitation mechanisms based on the related rese ...

    Intensify research into cyber attackers’ psychological and developmental profiles, motives and behavior—and develop efficient identification and rehabilitation mechanisms based on the related research results.

    Academia
    Solution
    Symposium 2010

    Improve public education systems for all potential internet users about the threat of cybercrime, and teach them ways of detecting potential cyber attackers and protecting themselves.

    Improve public education systems for all potential internet users about the threat of cybercrime, and teach them ways of detecting potential cyber attackers and protecting themselves.

    Improve public education systems for all potential internet users about the threat of cybercrime, and teach them ways of detecting potential cyber attackers and protecting themselves.

    Polity, Academia, Business, Civil Society
    Solution
    Symposium 2010

    To foster incentives for the development of products less likely to be attacked, initiate producer liability of software and other internet applications.

    To foster incentives for the development of products less likely to be attacked, initiate producer liability of software and other internet applications.

    To foster incentives for the development of products less likely to be attacked, initiate producer liability of software and other internet applications.

    Polity, Academia, Business
    Solution
    Symposium 2010

    Establish virtual taskforces to promote better international coordination between interregional law enforcement and governmental cybersecurity agencies.

    Establish virtual taskforces to promote better international coordination between interregional law enforcement and governmental cybersecurity agencies.

    Establish virtual taskforces to promote better international coordination between interregional law enforcement and governmental cybersecurity agencies.

    Polity